1AC - Neil Haran and Rohan Singh

advertisement
1AC – FREEDOM ACT
Plan
In the absence of an individually-tailored warrant obtained via use of a specific
selector term, federal intelligence agencies should cease collection of domestic phone,
internet, email, and-or associated electronic records.
FRAMEWORK
Reducing utility of human life to numbers justifies atrocity
Holt ‘95 [Jim Holt is an American philosopher, author and essayist. He has contributed to The New York Times, The New
York Times Magazine, The New York Review of Books, The New Yorker, The American Scholar, and Slate. He hosted a weekly
radio spot on BBC for ten years and he writes frequently about politics and philosophy. New York Times, “Morality, Reduced To
Arithmetic,” August 5, p. Lexis]
Can the deliberate massacre of innocent people ever be condoned? The atomic bombs dropped on Hiroshima and Nagasaki on Aug. 6 and 9, 1945, resulted in the deaths of 120,000 to 250,000
Japanese by incineration and radiation poisoning. Although a small fraction of the victims were soldiers, the great majority were noncombatants -- women, children, the aged. Among the
justifications that have been put forward for President Harry Truman’s decision to use the bomb, only one is worth taking seriously -- that it saved lives. The alternative, the reasoning goes,
was to launch an invasion. Truman claimed in his memoirs that this would have cost another half a million American lives. Winston Churchill put the figure at a million. Revisionist historians
have cast doubt on such numbers. Wartime documents suggest that military planners expected around 50,000 American combat deaths in an invasion. Still, when Japanese casualties, military
and civilian, are taken into account, the overall invasion death toll on both sides would surely have ended up surpassing that from Hiroshima and Nagasaki. Scholars will continue to argue over
whether there were other, less catastrophic ways to force Tokyo to surrender. But given the fierce obstinacy of the Japanese militarists, Truman and his advisers had some grounds for
believing that nothing short of a full-scale invasion or the annihilation of a big city with an apocalyptic new weapon would have succeeded. Suppose they were right. Would this prospect have
In the debate over the question, participants on both sides have been playing the
numbers game. Estimate the hypothetical number of lives saved by the bombings, then add up the
actual lives lost. If the first number exceeds the second, then Truman did the right thing; if the reverse, it was wrong to have dropped the bombs. That is one approach to the
matter -- the utilitarian approach. According to utilitarianism, a form of moral reasoning that arose in the 19th century, the goodness or evil of an action is
determined solely by its consequences. If somehow you can save 10 lives by boiling a baby, go
ahead and boil that baby . There is, however, an older ethical tradition, one rooted in Judeo-Christian theology, that
takes a quite different view. The gist of it is expressed by St. Paul’s condemnation of those who say, “Let us do evil, that good may come.” Some actions, this tradition holds,
can never be justified by their consequences; they are absolutely forbidden. It is always wrong
to boil a baby even if lives are saved thereby. Applying this absolutist morality to war can be tricky. When enemy soldiers are trying to enslave or
justified the intentional mass killing of the people of Hiroshima and Nagasaki?
kill us, the principle of self-defense permits us to kill them (though not to slaughter them once they are taken prisoner). But what of those who back them? During World War II, propagandists
made much of the “indivisibility” of modern warfare: the idea was that since the enemy nation’s entire economic and social strength was deployed behind its military forces, the whole
population was a legitimate target for obliteration. “There are no civilians in Japan,” declared an intelligence officer of the Fifth Air Force shortly before the Hiroshima bombing, a time when
the Japanese were popularly depicted as vermin worthy of extermination. The boundary between combatant and noncombatant can be fuzzy, but the distinction is not meaningless, as the
case of small children makes clear. Yet is wartime killing of those who are not trying to harm us always tantamount to murder? When naval dockyards, munitions factories and supply lines are
bombed, civilian carnage is inevitable. The absolutist moral tradition acknowledges this by a principle known as double effect: although it is always wrong to kill innocents deliberately, it is
sometimes permissible to attack a military target knowing some noncombatants will die as a side effect. The doctrine of double effect might even justify bombing a hospital where Hitler is
lying ill. It does not, however, apply to Hiroshima and Nagasaki. Transformed into hostages by the technology of aerial bombardment, the people of those cities were intentionally executed en
masse to send a message of terror to the rulers of Japan. The practice of ordering the massacre of civilians to bring the enemy to heel scarcely began with Truman. Nor did the bomb result in
casualties of a new order of magnitude. The earlier bombing of Tokyo by incendiary weapons killed some 100,000 people. What Hiroshima and Nagasaki did mark, by the unprecedented need
for rationalization they presented, was the triumph of
utilitarian thinking in the conduct of war. The conventional code of noncombatant immunity -- a product of several
centuries of ethical progress among nations, which had been formalized by an international commission in the 1920’s in the Hague -- was swept away. A simpler axiom took its place: since war
is a moral calculus that, for all its logical consistency,
offends our deep-seated intuitions about the sanctity of life -- our conviction that a person is always to be treated as an
end, never as a means. Left up to the warmakers, moreover, utilitarian calculations are susceptible to
bad-faith reasoning: tinker with the numbers enough and virtually any atrocity can be
is hell, any means necessary may be used to end, in Churchill’s words, “the vast indefinite butchery.” It
excused in the national interest. In January, the world commemorated the 50th anniversary of the liberation of Auschwitz, where mass slaughter was
committed as an end in itself -- the ultimate evil. The moral nature of Hiroshima is ambiguous by contrast. Yet in the postwar era, when governments do not hesitate to treat the massacre of
the bomb’s sinister legacy is plain: it has inured us to the idea of reducing
innocents to instruments and morality to arithmetic.
civilians as just another strategic option,
Utilitarian risk assessment obscures how structural violence and large-scale
destruction interact.
O’Brien 2k—PhD, environmental scientist and activist (Mary, © 2000, MIT Press, “Making Better
Environmental Decisions: An Alternative to Risk Assessment”, Gigapedia, p. xvii-xviii,)
This book is based on the understanding that it is not acceptable for people to tell you that the harms to
which they will subject you and the world are safe or insignificant. You deserve to know good
alternatives to those harms, and you deserve to help decide which alternative will be chosen. Underlying
this book, however, is a less explicitly stated personal belief, namely that we humans will never dredge
up enough will to alter our habitual, destructive ways of behaving toward each other and the world
unless we simultaneously employ information and emotion and a sense of relationship to others—other
species, other cultures, and other generations. Using information while divorced from emotion and
using information while insulated from connection to a wide net of others are how destruction of the
Earth is being accomplished. Risk assessment of narrow options is a classic example of using certain bits
of information in such a way as to exclude feeling and to artificially sever connections of parts to the
whole. Risk assessment rips you (and others) out of connection to the rest of the world and reduces you
(if you are even considered at all in the risk assessment) to a number. You are then consigned to damage
or death or “risk,” depending on how your number is shuffled around in models, assumptions, and
formulas and during “risk management.” Assessment of the pros and cons of a range of reasonable alternatives allows the
connections to remain. The cultural emotions connected to a given alternative, for instance, can be a pro or a con, and may be both, depending
on which sector of the community you inhabit. An advantage or a disadvantage of a given alternative can be social, religious, economic,
scientific, or political. Risk
assessment is one of the major methods by which parts (corporations such as
Monsanto or Hyundai, “private landowners,” industrial nations) can act on their wants at the expense of
wholes (e.g., whole communities and countries, or the seventh generation from now) without appearing
to be doing so. Risk assessment lets them appear simply “scientific” or “rational” as they numerically
estimate whether or how many deaths or what birth defects will be caused, and ignore other regions of
human experience that also matter to people. Always, some groups of humans will be trying to exercise
their power at the expense of the whole. Decisions arrived at by risk assessment can be homicidal,
biocidal, and suicidal, but they are made every day. Risk assessment is a premier process by which
illegitimate exercise of power is justified. The stakes of installing alternatives to risk assessment,
therefore, are the whole Earth (just as are the stakes of fashioning democratic control over
corporations, or of requiring changes in behavior of those who have wreaked irreparable damage).
Installing alternatives assessment is one step in the struggle to use information, feeling, and a sense of
relationship to others to stop socioenvironmental madness.
Current framing of security concerns disregards the way that securitization creates
enmity which is the root cause of violence
Mack 91 (John, Doctor of Psychiatry and a professor at Harvard University, “The Enemy System”
http://www.johnemackinstitute.org/eJournal/article.asp?id=23 *Gender modified)
The threat of nuclear annihilation has stimulated us to try to understand what it is about (hu)mankind
that has led to such self-destroying behavior. Central to this inquiry is an exploration of the
adversarial relationships between ethnic or national groups. It is out of such enmities that war,
including nuclear war should it occur, has always arisen. Enmity between groups of people stems from the
interaction of psychological, economic, and cultural elements. These include fear and hostility (which are often
closely related), competition over perceived scarce resources,[3] the need for individuals to identify
with a large group or cause,[4] a tendency to disclaim and assign elsewhere responsibility for unwelcome
impulses and intentions, and a peculiar susceptibility to emotional manipulation by leaders who play upon our
more savage inclinations in the name of national security or the national interest. A full understanding of the "enemy
system"[3] requires insights from many specialities, including psychology, anthropology, history, political science, and the
humanities. In their statement on violence[5] twenty social
and behavioral scientists, who met in Seville, Spain, to examine the
roots of war, declared that there was no scientific basis for regarding (hu)man(s) as an innately
aggressive animal, inevitably committed to war. The Seville statement implies that we have real choices . It also
points to a hopeful paradox of the nuclear age: threat of nuclear war may have provoked our capacity for feardriven polarization but at the same time it has inspired unprecedented efforts towards cooperation
and settlement of differences without violence. The Real and the Created Enemy Attempts to explore the
psychological roots of enmity are frequently met with responses on the following lines: "I can
accept psychological explanations of things, but my enemy is real. The Russians [or Germans, Arabs,
Israelis, Americans] are armed, threaten us, and intend us harm. Furthermore, there are real differences
between us and our national interests, such as competition over oil, land, or other scarce
resources, and genuine conflicts of values between our two nations. It is essential that we be strong and
maintain a balance or superiority of military and political power, lest the other side take advantage
of our weakness". This argument does not address the distinction between the enemy threat and one's
own contribution to that threat -by distortions of perception, provocative words, and actions. In short, the enemy is
real, but we have not learned to understand how we have created that enemy, or how the
threatening image we hold of the enemy relates to its actual intentions. "We never see our
enemy's motives and we never labor to assess his will, with anything approaching objectivity ".[6] Individuals may
have little to do with the choice of national enemies. Most Americans, for example, know only what has been reported in the mass media
about the Soviet Union. We
are largely unaware of the forces that operate within our institutions,
affecting the thinking of our leaders and ourselves, and which determine how the Soviet Union will
be represented to us. Ill-will and a desire for revenge are transmitted from one generation to another, and we are not
taught to think critically about how our assigned enemies are selected for us. In the relations between
potential adversarial nations there will have been, inevitably, real grievances that are grounds for enmity. But the attitude of one people
towards another is usually determined by leaders who manipulate the minds of citizens for domestic political reasons which are generally
unknown to the public. As Israeli sociologist Alouph Haveran has said, in
times of conflict between nations historical
accuracy is the first victim.[8] The Image of the Enemy and How We Sustain It Vietnam veteran William Broyles wrote: " War
begins in the mind, with the idea of the enemy. "[9] But to sustain that idea in war and peacetime a nation's
leaders must maintain public support for the massive expenditures that are required. Studies of
enmity have revealed susceptibilities, though not necessarily recognized as such by the governing elites that provide raw
material upon which the leaders may draw to sustain the image of an enemy.[7,10] Freud[11] in his
examination of mass psychology identified the proclivity of individuals to surrender personal
responsibility to the leaders of large groups. This surrender takes place in both totalitarian and democratic societies, and
without coercion. Leaders can therefore designate outside enemies and take actions against them with little opposition. Much further
research is needed to understand the psychological
mechanisms that impel individuals to kill or allow killing in
their name, often with little questioning of the morality or consequences of such actions. Philosopher and
psychologist Sam Keen asks why it is that in virtually every war "The enemy is seen as less than human? He's faceless. He's an animal"."
Keen tries to answer his question: "The
image of the enemy is not only the soldier's most powerful weapon; it is society's
most powerful weapon. It enables people en masse to participate in acts of violence they would never
consider doing as individuals".[12] National leaders become skilled in presenting the adversary in dehumanized images. The mass media,
taking their cues from the leadership, contribute powerfully to the process.
Institutional structures of domination create everyday holocausts—you should reject
singular focused impacts in favor of working against the ongoing extinctions of people
of color – This is the only ethical question and controls the proximity and conditions
for all of their impacts.
Omolade 89 (1989, Barbara Omolade is a historian of black women for the past twenty years and an organizer in both the women’s and
civil rights/black power movements, “We Speak for the Planet” in “Rocking the ship of state : toward a feminist peace politics”, pp. 172-176)
Recent efforts by Soviet leader Mikhail Gorbachev and President Ronald Reagan to
limit nuclear testing, stockpiling, and
weaponry, while still protecting their own arsenals and selling arms to countries and factions around the world, vividly demonstrate
how "peace" can become an abstract concept within a culture of war. Many peace activists are
similarly blind to the constant wars and threats of war being waged against people of color
and the planet by those who march for "peace" and by those they march against . These pacifists ,
like Gorbachev and Reagan, frequently want people of color to fear what they fear and
define peace as they define it. They are unmindful that our lands and peoples have already
been and are being destroyed as part of the "final solution" of the "color line." It is difficult
to persuade the remnants of Native American tribes , the starving of African deserts , and the
victims of the Cambodian "killing fields" that nuclear war is the major danger to human life
on the planet and that only a nuclear "winter" embodies fear and futurelessness for
humanity . The peace movement suffers greatly from its lack of a historical and holistic
perspective, practice, and vision that include the voices and experiences of people of color; the
movement's goals and messages have therefore been easily coopted and expropriated by
world leaders who share the same culture of racial dominance and arrogance . The peace
movement's racist blinders have divorced peace from freedom, from feminism, from
education reform, from legal rights, from human rights, from international alliances and
friendships, from national liberation, from the particular (for example, black female, Native American male)
and the general (human being). Nevertheless, social movements such as the civil rights-black power movement in
the United States have always demanded peace with justice, with liberation, and with social and
economic reconstruction and cultural freedom at home and abroad. The integration of our past and our
present holocausts and our struggle to define our own lives and have our basic needs met are
at the core of the inseparable struggles for world peace and social betterment. The Achilles heel of
the organized peace movement in this country has always been its whiteness. In this multi-racial and racist society, no allwhite movement can
have the strength to bring about basic changes. It is axiomatic that basic changes do not occur in any society unless the people who are
oppressed move to make them occur. In our society it is people of color who are the most oppressed. Indeed our entire history teaches us that
when people of color have organized and struggled-most especially, because of their particular history, Black people-have moved in a more
humane direction as a society, toward a better life for all people.1 Western man's whiteness, imagination, enlightened science, and
movements toward peace have developed from a culture and history mobilized against
women of color . The political advancements of white men have grown directly from the
devastation and holocaust of people of color and our lands . This technological and material progress has been
in direct proportion to the undevelopment of women of color. Yet the
dayto- day survival, political struggles, and
rising up of women of color, especially black women in the United States, reveal both complex resistance to
holocaust and undevelopment and often conflicted responses to the military and war. The
Holocausts Women of color are survivors of and remain casualties of holocausts , and we are direct
victims of war -that is, of open armed conflict between countries or between factions within the same country. But women of
color were not soldiers, nor did we trade animal pelts or slaves to the white man for guns, nor
did we sell or lease our lands to the white man for wealth. Most men and women of color
resisted and fought back , were slaughtered , enslaved , and force marched into plantation
labor camps to serve the white masters of war and to build their empires and war machines .
People of color were and are victims of holocausts-that is, of great and widespread destruction,
usually by fire. The world as we knew and created it was destroyed in a continual scorched
earth policy of the white man. The experience of Jews and other Europeans under the Nazis can teach us the value of understanding the
totality of destructive intent, the extensiveness of torture, and the demonical apparatus of war aimed at the human spirit. A Jewish father
pushed his daughter from the lines of certain death at Auschwitz and said, "You will be a remembrance-You tell the story. You survive." She
lived. He died. Many have criticized the Jews for forcing non-Jews to remember the 6 million Jews who died under the Nazis and for etching the
names Auschwitz and Buchenwald, Terezin and Warsaw in our minds. Yet as women
of color, we, too, are "remembrances"
of all the holocausts against the people of the world. We must remember the names of
concentration camps such as Jesus, Justice, Brotherhood, and Integrity , ships that carried
millions of African men, women, and children chained and brutalized across the ocean to the
"New World." We must remember the Arawaks, the Taino, the Chickasaw, the Choctaw, the
Narragansett, the Montauk, the Delaware, and the other Native American names of thousands
of U.S. towns that stand for tribes of people who are no more. We must remember the
holocausts visited against the Hawaiians, the aboriginal peoples of Australia, the Pacific Island
peoples, and the women and children of Hiroshima and Nagasaki. We must remember the
slaughter of men and women at Sharpeville, the children of Soweto, and the men of Attica. We
must never, ever, forget the children disfigured, the men maimed, and the women broken in
our holocausts-we must remember the names, the numbers, the faces, and the stories and
teach them to our children and our children's children so the world can never forget our
suffering and our courage. Whereas the particularity of the Jewish holocaust under the Nazis is over, our holocausts continue .
We are the madres locos (crazy mothers) in the Argentinian square silently demanding news of our
missing kin from the fascists who rule. We are the children of El Salvador who see our
mothers and fathers shot in front of our eyes . We are the Palestinian and Lebanese women
and children overrun by Israeli, Lebanese, and U.S. soldiers . We are the women and children
of the bantustans and refugee camps and the prisoners of Robbin Island. We are the starving
in the Sahel , the poor in Brazil , the sterilized in Puerto Rico. We are the brothers and sisters of Grenada who
carry the seeds of the New Jewel Movement in our hearts, not daring to speak of it with our lipsyet. Our holocaust is South Africa ruled by men
who loved Adolf Hitler, who have developed the Nazi techniques of terror to more sophisticated levels. Passes replace the Nazi badges and
stars. Skin color is the ultimate badge of persecution. Forced removals of women, children, and the elderly-the "useless appendages of South
Africa"-into barren, arid bantustans without resources for survival have replaced the need for concentration camps. Black sex-segregated
barracks and cells attached to work sites achieve two objectives: The work camps destroy black family and community life, a presumed source
of resistance, and attempt to create human automatons whose purpose is to serve the South African state's drive toward wealth and
hegemony. Like other fascist regimes, South Africa disallows any democratic rights to black people; they are denied the right to vote, to dissent,
to peaceful assembly, to free speech, and to political representation. The regime has all the typical Nazi-like political apparatus: house arrests of
dissenters such as Winnie Mandela; prison murder of protestors such as Stephen Biko; penal colonies such as Robbin Island. Black people,
especially children, are routinely arrested without cause, detained without limits, and confronted with the economic and social disparities of a
nation built around racial separation. Legally and economically, South African apartheid is structural and institutionalized racial war. The
Organization of African Unity's regional intergovernmental meeting in 1984 in Tanzania was called to review and appraise the achievements of
the United Nations Decade for Women. The meeting considered South Africa's racist apartheid regime a peace issue. The "regime is an affront
to the dignity of all Africans on the continent and a stark reminder of the absence of equality and peace, representing the worst form of
institutionalized oppression and strife." Pacifists such as Martin Luther King, Jr. and Mahatma Gandhi who have used nonviolent resistance
charged that those who used violence to obtain justice were just as evil as their oppressors. Yet all successful revolutionary movements have
used organized violence. This is especially true of national liberation movements that have obtained state power and reorganized the
institutions of their nations for the benefit of the people. If men and women in South Africa do not use organized violence, they could remain in
the permanent violent state of the slave. Could it be that pacifism and nonviolence cannot become a way of life for the oppressed? Are they
only tactics with specific and limited use for protecting people from further violence? For most people in the developing communities and the
developing world consistent nonviolence is a luxury; it presumes that those who have and use nonviolent weapons will refrain from using them
long enough for nonviolent resisters to win political battles. To survive, peoples in developing countries must use a varied repertoire of issues,
tactics, and approaches. Sometimes arms are needed to defeat apartheid and defend freedom in South Africa; sometimes nonviolent
demonstrations for justice are the appropriate strategy for protesting the shooting of black teenagers by a white man, such as happened in
New York City.
Peace is not merely an absence of 'conflict that enables white middleclass comfort ,
nor is it simply resistance to nuclear war and war machinery . The litany of "you will be blown
up, too" directed by a white man to a black woman obscures the permanency and
institutionalization of war, the violence and holocaust that people of color face daily .
Unfortunately, the holocaust does not only refer to the mass murder of Jews, Christians, and atheists
during the Nazi regime; it also refers to the permanent institutionalization of war that is part of
every fascist and racist regime. The holocaust lives. It is a threat to world peace as pervasive
and thorough as nuclear war.
ADV 1 BIGOTRY
Placing race at the forefront of the struggle against surveillance is the only ethical
starting point
Kumar & Kundnani ‘15
Deepa Kumar is an associate professor of Media Studies and Middle East Studies at Rutgers University. She is the author of
Islamophobia and the Politics of Empire (Haymarket Books, 2012). Arun Kundnani is research fellow at the International Centre
for Counter-Terrorism. He is a writer and activist, and a professor at NYU. “Race, surveillance, and empire” – International
Socialist Review - Issue #96 – Spring - http://isreview.org/issue/96/race-surveillance-and-empire
Beginning in June 2013, a series of news articles
based on whistle-blower Edward Snowden’s collection of documents from the
National Security Agency (NSA) took the world by storm. Over the course of a year, the Snowden material provided a
detailed account of the massive extent of NSA’s warrantless data collection. What became clear was that the NSA was
involved in the mass collection of online material. Less apparent was how this data was actually used by the NSA and other
national security agencies. Part of the answer came in July 2014 when Glenn Greenwald and Murtaza Hussain published an
article that identified specific targets of NSA surveillance and showed how individuals were being placed
under surveillance despite there being no reasonable suspicion of their involvement in criminal activity.1
All of those named as targets were prominent Muslim Americans. The following month, Jeremy Scahill and Ryan Devereaux
published another story for The Intercept, which revealed that under the Obama administration the number of people on the
National Counterterrorism Center’s no-fly list had increased tenfold to 47,000. Leaked classified documents showed that the NCC maintains a
database of terrorism suspects worldwide—the Terrorist Identities Datamart Environment—which contained a million names by 2013, double the number four
years earlier, and increasingly includes biometric data. This
database includes 20,800 persons within the United States who
are disproportionately concentrated in Dearborn, Michigan, with its significant Arab American
population.2 By any objective standard, these were major news stories that ought to have attracted as much attention as the earlier revelations. Yet the
stories barely registered in the corporate media landscape. The “tech community,” which had earlier expressed outrage at the NSA’s mass digital surveillance,
seemed to be indifferent when details emerged of the targeted surveillance of Muslims. The explanation for this reaction is not hard to find. While
many
object to the US government collecting private data on “ordinary” people, Muslims tend to be seen as
reasonable targets of suspicion. A July 2014 poll for the Arab American Institute found that 42 percent of Americans think it is justifiable for law
enforcement agencies to profile Arab Americans or American Muslims.3 In what follows, we argue that the debate on national security
surveillance that has emerged in the United States since the summer of 2013 is woefully inadequate, due to its
failure to place questions of race and empire at the center of its analysis. It is racist ideas that form the basis
for the ways national security surveillance is organized and deployed, racist fears that are whipped up to
legitimize this surveillance to the American public, and the disproportionately targeted racialized groups that have been most effective in making
sense of it and organizing opposition. This is as true today as it has been historically: race and state surveillance are intertwined in the history of US capitalism.
Likewise, we argue that the history of national security surveillance in the United States is inseparable from the history of US colonialism and empire.
Warrantless surveillance boosts a distinct form of racial, religious, and ethnic
discrimination. The Neg’s security interests only drive this racialized violence.
Unegbu ‘13
Cindy C. Unegbu - J.D. Candidate, Howard University School of Law - NOTE AND COMMENT: National Security Surveillance on
the Basis of Race, Ethnicity, and Religion: A Constitutional Misstep - Howard Law Journal - 57 How. L.J. 433 - Fall, 2013 – lexis;
lawrev
Picture this: you live in a society in which the government is allowed to partake in intrusive surveillance
measures without the institutionalized checks and balances upon which the government was founded. In this society, the
government pursues citizens who belong to a particular race or ethnicity, practice a certain religion, or have affiliations with
specific interest groups. Individuals who have these characteristics are subject to surreptitious monitoring, which
includes undercover government officials disguising themselves as community members in order to attend various community events and programs. The government may
also place these individuals on watch lists, even where there is no evidence of wrongdoing. These watch lists classify
domestic individuals as potential or suspected terrorists and facilitate the monitoring of their personal activity through various law enforcement agencies for an extended period of time.
This "hypothetical" society is not hypothetical at all; in fact, it is the current state of American surveillance.
The government's domestic spying activities have progressed to intrusive levels, primarily due to an increased
fear of terrorism. n1 This fear has resulted in governmental intelligence efforts that are focused on political
racial and religious minorities, and immigrants. n2 [*435] The government's domestic surveillance efforts are
not only geared toward suspected terrorists and those partaking in criminal activity, but reach any innocent, non-criminal, non-terrorist national, all in the
activists,
name of national security. The government's power to engage in suspicionless surveillance and track innocent
citizens' sensitive information has been granted through the creation and revision of the National Counterterrorism Center n3 and the FBI's (Federal Bureau of Investigation) Domestic
Investigations and Operations Guide. n4 The grant of surveillance power has resulted in many opponents, including those within the current presidential administration, who challenge the
order for numerous reasons. n5 These reasons include the inefficiency of storing citizens' random personal information for extended periods of time, n6 the broad unprecedented authority
granted to this body of government without proper approval from Congress, n7 and the constitutional violations due to the deprivation of citizens' rights. n8 [*436] This Comment argues that
the wide-sweeping surveillance authority granted to the government
results in a violation of the Fourteenth Amendment's Equal Protection Clause due to far-reaching domestic
monitoring practices. Surveillance practices, such as posing as members of the community and placing individuals on watch lists without suspicion of terrorist activity, result in the
impermissible monitoring of individuals on the basis of their race or ethnicity . These practices, although done in the name of
national security, an established compelling government interest, violate the Equal Protection Clause of the Fourteenth Amendment because they are not narrowly tailored to the stated
interest.
The procedures are not narrowly tailored to the interest of national security because of the over-
inclusiveness of the measures.
Most everyone violates some law from time-to-time. Mass surveillance results in
selective enforcement that disproportionately impacts those lacking privilege.
Stanfill ‘13
Mel - The author now holds a Ph.D. from the University of Illinois, Urbana-Champaign in Communications and Media. The
Author was working on that PhD at this time of this writing. When this piece was written, the author held an M.A. from
California State University, East Bay in Media and Cultural Studies and had Graduate minors in Gender and Women’s Studies
and Queer Studies. The author also held a B.A. from University of California, Berkeley - English with Distinction in General
Scholarship. At the time of this writing, the author had published several Peer-Reviewed Publications. The author is internally
quoting Daniel J. Solove is the John Marshall Harlan Research Professor of Law at the George Washington University Law
School. “NSA Prism Part III: Due Process and Presumed Guilty” - July 1, 2013 – http://www.melstanfill.com/nsa-prism-part-iiidue-process-and-presumed-guilty/
Posing this as a due process question could be the way to get some traction in light of the nonchalance about privacy discussed last week: The
problem with NSA PRISM is that we are all being treated as guilty until proven innocent. This has been going on since 9/11, of course, with
airport security being one highly visible iteration, but there’s a chance that this new level of awareness of just how much everyone is being
treated as criminal without due process of law could be the straw. Solove describes the stakes well: “Even
if a person is doing
nothing wrong, in a free society, that person shouldn’t have to justify every action that government
officials might view as suspicious. A key component of freedom is not having to worry about how to
explain oneself all the time.” Crossing this line into blanket assumption of guilt is what animates the Stop Watching US petition, which
says “the contents of communications of people both abroad and in the U.S. can be swept in without any suspicion of crime or association with
a terrorist organization,” though they tie their concern to the 1st and 4th amendment and “citizens’ right to speak and associate anonymously,
guard against unreasonable searches and seizures, and protect their right to privacy” without mentioning due process. (That people feel due
process has gone out the window is clear from the fact that RootsAction sent me a petition to President Obama “not to engage in any
abduction or other foul play against Snowden,” ironic when the administration’s line on why they’re disappointed that Hong Kong let him leave
is that they want there to be rule of law.) Wired perhaps elaborates the worst-case-scenario best: “Police
already abuse the
immense power they have, but if everyone’s every action were being monitored, and everyone
technically violates some obscure law at some time, then punishment becomes purely selective. Those
in power will essentially have what they need to punish anyone they’d like, whenever they choose, as if
there were no rules at all.” Of course, black and Latino citizens have been living under presumed-guilty,
surveilled-within-an inch-of-their-lives, selectively-punished conditions for decades: they’re more likely
to get caught at things white folks also do and be punished more harshly for them, even as early as
middle school (see Ann Ferguson’s Bad Boys). Muslim and Arab citizens have been living under it since
9/11.
An ethical ballot rejects the logic of the security state: that’s key to break down
stereotypes that configure racism
Kumar & Kundnani ‘15
Deepa Kumar is an associate professor of Media Studies and Middle East Studies at Rutgers University. She is the author of
Islamophobia and the Politics of Empire (Haymarket Books, 2012). Arun Kundnani is research fellow at the International Centre
for Counter-Terrorism. He is a writer and activist, and a professor at NYU. “Race, surveillance, and empire” – International
Socialist Review - Issue #96 – Spring - http://isreview.org/issue/96/race-surveillance-and-empire
In the second part, we
turn our attention to the current conjuncture in which the politics of the War on Terror shape
national security surveillance practices. The intensive surveillance of Muslim Americans has been carried
out by a vast security apparatus that has also been used against dissident movements such as Occupy
Wall Street and environmental rights activists, who represent a threat to the neoliberal order. This is not new;
the process of targeting dissenters has been a constant feature of American history. For instance, the Alien and Sedition Acts of the late 1790s were passed by the
Federalist government against the Jeffersonian sympathizers of the French Revolution. The British hanged Nathan Hale because he spied for Washington’s army in
the American Revolution. State
surveillance regimes have always sought to monitor and penalize a wide range of dissenters,
radicals, and revolutionaries. Race was a factor in some but by no means all of these cases. Our focus here is on the production of racialized “others” as
security threats and the ways this helps to stabilize capitalist social relations. Further, the current system of mass surveillance of
Muslims is analogous to and overlaps with other systems of racialized security surveillance that feed the mass
deportation of immigrants under the Obama administration and that disproportionately target African Americans,
contributing to their mass incarceration and what Michelle Alexander refers to as the New Jim Crow.4 We argue that racialized
groupings are produced in the very act of collecting information about certain groups deemed as
“threats” by the national security state— the Brown terrorist , the Black and Brown drug dealer and user,
and the immigrant who threatens to steal jobs. We conclude that “ security” has become one of the primary means
through which racism is ideologically reproduced in the “post-racial,” neoliberal era. Drawing on W. E. B. Dubois’s notion of the
“psychological wage,” we argue that neoliberalism has been legitimized in part through racialized notions of security that offer a new “psychological wage” as
compensation for the decline of the social wage and its reallocation to “homeland security.”
Rejecting racism in every instance key
Memmi 2K
Albert - Professor Emeritus of Sociology @ U of Paris, Naiteire, Racism, Translated by Steve Martinot, p. 163-165
The struggle against racism will be long, difficult, without intermission, without remission, probably
never achieved. Yet, for this very reason, it is a struggle to be undertaken without surcease and without
concessions. One cannot be indulgent toward racism; one must not even let the monster in the house,
especially not in a mask. To give it merely a foothold means to augment the bestial part in us and in
other people, which is to diminish what is human. To accept the racist universe to the slightest degree is
to endorse fear, injustice, and violence. It is to accept the persistence of the dark history in which we still
largely live. it is to agree that the outsider will always be a possible victim (and which man is not
himself an outsider relative to someone else?. Racism illustrates, in sum, the inevitable negativity of the
condition of the dominated that is, it illuminates in a certain sense the entire human condition. The antiracist struggle, difficult though it is, and always in question, is nevertheless one of the prologues to the
ultimate passage from animosity to humanity . In that sense, we cannot fail to rise to the racist challenge.
However, it remains true that one’s moral conduit only emerges from a choice: one has to want it. It is a
choice among other choices, and always debatable in its foundations and its consequences. Let us say,
broadly speaking, that the choice to conduct oneself morally is the condition for the establishment of a
human order, for which racism is the very negation. This is almost a redundancy. One cannot found a
moral order, let alone a legislative order, on racism, because racism signifies the exclusion of the other,
and his or her subjection to violence and domination. From an ethical point of view, if one can deploy a little religious
language, racism is ‘the truly capital sin. It is not an accident that almost all of humanity’s spiritual
traditions counsels respect for the weak, for orphans, widows, or strangers. It is not just a question of theoretical
morality and disinterested commandments. Such unanimity in the safeguarding of the other suggests the real utility of such
sentiments. All things considered, we have an interest in banishing injustice, because injustice engenders violence and death .
Of course, this is debatable. There are those who think that if one is strong enough, the assault on and
oppression of others is permissible. Bur no one is ever sure of remaining the strongest. One day, perhaps, the roles will
be reversed. All unjust society contains within itself the seeds of its own death. It is probably smarter to treat
others with respect so that they treat you with respect. “Recall.” says the Bible, “that you were once a stranger in Egypt,” which means both
that you ought to respect the stranger because you were a stranger yourself and that you risk becoming one again someday. It is an ethical and
a practical appeal—indeed, it is a contract, however implicit it might be. In
short, the refusal of racism is the condition for all
theoretical and practical morality because, in the end, the ethical choice commands the political choice,
a just society must be a society accepted by all. If this contractual principle is not accepted, then only
conflict, violence, and destruction will be our lot. If it is accepted, we can hope someday to live in peace.
True, it is a wager, but the stakes are irresistible.
Bias goes our way- be skeptic of their scholarship
Wong & Belair-Gagnon ‘13
Albert Wong and Valerie Belair-Gagnon are resident fellows at the Information Society Project at Yale Law School – “On the
NSA, the media may tilt right” – Columbia Journalism Review – October 23rd http://www.cjr.org/the_kicker/news_media_pro_surveillance_bi.php
Since June 6, the world has been roiled by an ongoing series of disclosures based on Edward Snowden’s document leaks, with coverage led by the Guardian and the
Washington Post, about clandestine mass surveillance conducted, with little oversight, by the NSA and its international partners. Public
perceptions of
these surveillance revelations are affected not only by the NSA’s actual actions, but also by the news coverage of the
government’s spying programs. Previous studies have shown that the latter factor can have a profound effect on
opinion. Given the importance of this issue, we decided to analyze major US newspapers’ “post-Snowden” coverage of the Foreign
Intelligence Surveillance Act (FISA) and the Foreign Intelligence Surveillance Court (FISC) to determine if there was an overall bias in either
a pro- (traditionally conservative) or anti-surveillance (traditionally liberal) direction. The results were unexpected, and quite remarkable. Our
public
analysis of total press coverage of FISA and FISC between July 1 and July 31 (July was the first full calendar month after the initial disclosures in June) revealed that
the widely held assumption that major media outlets uniformly tilt to the left does not match reality. In fact, if anything, the
media appears to tilt to
the right, at least on this issue. We did a LexisNexis search of four of the largest US newspapers by circulation: The New York Times, USA Today,
the Los Angeles Times, and the Washington Post. Of the 30 traditionally pro- or anti-surveillance terms we examined (15 each, listed below) in all four newspapers,
key words generally used to justify increased surveillance, such as security or terrorism , were used much more
frequently than terms that tend to invoke opposition to mass surveillance, such as privacy or liberty. USA Today led the pack,
using pro-surveillance terms 36 percent more frequently than anti-surveillance terms. The LA Times followed at 24 percent, while The New York Times was at 14.1
percent. Even the Washington Post, where Barton Gellman was the first US journalist to break the news of the NSA’s surveillance, exhibited a net pro-surveillance
bias in its coverage of 11.1 percent. Although keyword frequency analysis on its own is not always conclusive, large, consistent discrepancies of the kind observed
here strongly suggest a net media bias in favor of the US and UK governments’ pro-surveillance position. The pro-surveillance media bias we found was not, in
general, overt. In our opinion, most of the New York Times’ FISA/FISC coverage was neutral in tone. But
covert bias is still bias—in fact, it may even
be more effective than blatant bias , since readers may not notice its existence. A seemingly neutral article could leave a net
pro-surveillance impression on readers if it contains an excess of references to, say, foreign terrorists or national security—terms that tend to frame the issue as a
question of patriotic willingness to do what it takes to keep the country safe. Our findings indicate that the intense public concern about the NSA’s activities is not
merely an artifact of biased coverage, since the media actually appears to be biased in the opposite direction. In a recent Associated Press-NORC Center for Public
Affairs Research poll, 54 percent of respondents disagreed with dragnet collection of internet metadata and 71 percent disagreed with warrantless monitoring of US
phone calls. Public opposition
to the government surveillance might be even more pronounced if overall media
coverage was neutral and unbiased. Consciously or not, Western journalists and media outlets may still (even more than a
decade after 9/11) be wary of appearing to be “soft on terror,” much as they once were about appearing to be soft on Communism. President
George W. Bush’s September 2001 admonition that “either you are with us, or you are with the terrorists” appears to have an enduring legacy in media bias.
ADV 2 IS PRIVACY
Privacy coming 2nd to security justifies destruction of all rights and destruction of
identity
Solove ‘7 [Daniel Solove is an Associate Professor at George Washington University Law School and holds a J.D. from Yale Law School. He
is one of the world’s leading expert in information privacy law and is well known for his academic work on privacy and for popular books on
how privacy relates with information technology. He has written 9 books and more than 50 law review articles – From the Article ““I’ve Got
Nothing to Hide” and Other Misunderstandings of Privacy” - San Diego Law Review, Vol. 44, p. 745 - GWU Law School Public Law Research
Paper No. 289 – available from download at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565]
It is time to return to the
nothing to hide argument . The reasoning of this argument is that when it comes to government
surveillance or use of personal data, there is no privacy violation if a person has nothing sensitive, embarrassing, or illegal
to conceal. Criminals involved in illicit activities have something to fear, but for the vast majority of people, their activities are not
illegal or embarrassing. Understanding privacy as I have set forth reveals the flaw of the nothing to hide argument at its roots. Many commentators who respond to
the argument attempt a direct refutation by trying to point to things that people would want to hide. But the problem with the nothing to hide argument is the
underlying assumption that privacy is about hiding bad things. Agreeing
with this assumption concedes far too much ground
and leads to an unproductive discussion of information people would likely want or not want to hide. As Bruce Schneier aptly notes, the
nothing to hide argument stems from a faulty “premise that privacy is about hiding a wrong.”75 The deeper
problem with the nothing to hide argument is that it myopically views privacy as a form of concealment or secrecy. But understanding privacy as a plurality of
related problems demonstrates that concealment of bad things is just one among many problems caused by government programs such as the NSA surveillance and
data mining. In the categories in my taxonomy, several problems are implicated. The
NSA programs involve problems of information
collection, specifically the category of surveillance in the taxonomy. Wiretapping involves audio surveillance of people’s conversations. Data mining
often begins with the collection of personal information, usually from various third parties that possess people’s data. Under current Supreme Court Fourth
Amendment jurisprudence, when the government gathers data from third parties, there is no Fourth Amendment protection because people lack a “reasonable
expectation of privacy” in information exposed to others.76 In United States v. Miller, the Supreme Court concluded that there is no reasonable expectation of
privacy in bank records because “[a]ll of the documents obtained, including financial statements and deposit slips, contain only information voluntarily conveyed to
the banks and exposed to their employees in the ordinary course of business.”77 In Smith v. Maryland, the Supreme Court held that people lack a reasonable
expectation of privacy in the phone numbers they dial because they “know that they must convey numerical information to the phone company,” and therefore
they cannot “harbor any general expectation that the numbers they dial will remain secret.”78 As I have argued extensively elsewhere, the lack of Fourth
Amendment protection of third party records results in the government’s ability to access an extensive amount of personal information with minimal limitation or
oversight.79 Many scholars have referred to information collection as a form of surveillance. Dataveillance, a term coined by Roger Clarke, refers to the “systemic
use of personal data systems in the investigation or monitoring of the actions or communications of one or more persons.”80 Christopher Slobogin has referred to
the gathering of personal information in business records as “transaction surveillance.”81 Surveillance
can create chilling effects on free
speech, free association, and other First Amendment rights essential for democracy.82 Even surveillance
of legal activities can inhibit people from engaging in them. The value of protecting against chilling
effects is not measured simply by focusing on the particular individuals who are deterred from
exercising their rights. Chilling effects harm society because, among other things, they reduce the range of
viewpoints expressed and the degree of freedom with which to engage in political activity. The nothing to hide
argument focuses primarily on the information collection problems associated with the NSA programs. It contends that limited surveillance of lawful activity will not
chill behavior sufficiently to outweigh the security benefits. One can certainly quarrel with this argument, but one of the difficulties with chilling effects is that it is
often very hard to demonstrate concrete evidence of deterred behavior.83 Whether the NSA’s surveillance and collection of telephone records has deterred people
from communicating particular ideas would be a difficult question to answer. Far too often, discussions of the NSA surveillance and data mining define the problem
solely in terms of surveillance. To return to my discussion of metaphor, the problems are not just Orwellian, but Kafkaesque. The
NSA programs are
problematic even if no information people want to hide is uncovered. In The Trial, the problem is not inhibited
behavior, but rather a suffocating powerlessness and vulnerability created by the court system’s use of personal data
and its exclusion of the protagonist from having any knowledge or participation in the process. The harms consist of those created by bureaucracies—indifference,
errors, abuses, frustration, and lack of transparency and accountability. One such harm, for example, which I call aggregation, emerges from the combination of
small bits of seemingly innocuous data.84 When combined, the information becomes much more telling about a person. For the person who truly has nothing to
hide, aggregation is not much of a problem. But in the stronger, less absolutist form of the nothing to hide argument, people argue that certain pieces of
information are not something they would hide. Aggregation, however, means that by combining pieces of information we might not care to conceal, the
government can glean information about us that we might really want to conceal. Part of the
its ability
allure of data mining for the government is
to reveal a lot about our personalities and activities by sophisticated means of analyzing data. Therefore, without greater
transparency in data mining,
it is hard to claim that programs like the NSA data mining program will not reveal
information people might want to hide, as we do not know precisely what is revealed. Moreover, data mining aims to be predictive of
behavior, striving to prognosticate about our future actions. People who match certain profiles are deemed likely to engage in a similar pattern of behavior. It is
quite difficult to refute actions that one has not yet done. Having nothing to hide will not always dispel predictions of future activity. Another
problem in
the taxonomy, which is implicated by the NSA program, is the problem I refer to as exclusion.85 Exclusion is the problem caused when
people are prevented from having knowledge about how their information is being used, as well as
barred from being able to access and correct errors in that data. The NSA program involves a massive database of information
that individuals cannot access. Indeed, the very existence of the program was kept secret for years.86 This kind of information processing, which forbids people’s
knowledge or involvement, resembles in some ways a kind of due process problem. It is a structural problem involving the way people are treated by government
institutions. Moreover, it creates a power imbalance between individuals and the government. To what extent should the Executive Branch and an agency such as
the NSA, which is relatively insulated from the political process and public accountability, have a significant power over citizens? This
issue is not about
whether the information gathered is something people want to hide, but rather about the power and
the structure of government. A related problem involves “secondary use.” Secondary use is the use of data obtained for one purpose for a different
unrelated purpose without the person’s consent. The Administration has said little about how long the data will be stored, how it will be used, and what it could be
used for in the future. The potential future uses of any piece of personal information are vast, and without limits or accountability on how that information is used,
it is hard for people to assess the dangers of the data being in the government’s control. Therefore, the problem with the nothing to hide argument is that it focuses
on just one or two particular kinds of privacy problems—the disclosure of personal information or surveillance—and not others. It assumes a particular view about
the terms for debate in a manner that is often unproductive. It is important to distinguish here between two ways of
justifying a program such as the NSA surveillance and data mining program. The first way is to not recognize a problem. This is how the nothing to
hide argument works—it denies even the existence of a problem. The second manner of justifying such a program is to acknowledge the problems
but contend that the benefits of the NSA program outweigh the privacy harms. The first justification influences the
second, because the low value given to privacy is based upon a narrow view of the problem. The key misunderstanding is that the nothing to
hide argument views privacy in a particular way—as a form of secrecy, as the right to hide things. But there are many
other types of harm involved beyond exposing one’s secrets to the government. Privacy problems are often difficult to
what privacy entails, and it sets
recognize and redress because they create a panoply of types of harm. Courts, legislators, and others look for particular types of harm to the exclusion of others,
and their narrow focus blinds them to seeing other kinds of harms. One of
the difficulties with the nothing to hide argument is that it looks for a
visceral kind of injury as opposed to a structural one. Ironically, this underlying conception of injury is shared by both those
advocating for greater privacy protections and those arguing in favor of the conflicting interests to privacy. For example, law professor
Ann Bartow argues that I have failed to describe privacy harms in a compelling manner in my article, A Taxonomy of Privacy, where I provide a
framework for understanding the manifold different privacy problems.87 Bartow’s primary complaint is that my taxonomy “frames privacy harms in dry, analytical
terms that fail to sufficiently identify and animate the compelling ways that privacy violations can negatively impact the lives of living, breathing human beings
does not have “enough dead bodies” and that
privacy’s “lack of blood and death, or at least of broken bones and buckets of money, distances privacy harms from
other categories of tort law. Most privacy problems lack dead bodies. Of course, there are exceptional cases such as the murders of
beyond simply provoking feelings of unease.”88 Bartow claims that the taxonomy
Rebecca Shaeffer and Amy Boyer. Rebecca Shaeffer was an actress killed when a stalker obtained her address from a Department of Motor Vehicles record.90 This
incident prompted Congress to pass the Driver’s Privacy Protection Act of 1994.91 Amy Boyer was murdered by a stalker who obtained her personal information,
including her work address and Social Security number, from a database company.92 These examples aside, there is not a lot of death and gore in privacy law. If this
is the standard to recognize a problem, then few privacy problems will be recognized. Horrific cases are not typical, and the purpose of my taxonomy is to explain
why most privacy problems are still harmful despite this fact. Bartow’s objection is actually very similar to the nothing to hide argument. Those
advancing
the nothing to hide argument have in mind a particular kind of visceral privacy harm, one where privacy is violated only when something deeply
embarrassing or discrediting is revealed. Bartow’s quest for horror stories represents a similar desire to find visceral privacy harms. The problem is
that not all privacy harms are like this. At the end of the day, privacy is not a horror movie, and demanding more palpable harms will be difficult in
many cases. Yet there is still a harm worth addressing, even if it is not sensationalistic. In many instances, privacy is
threatened not by singular egregious acts, but by a slow series of relatively minor acts which gradually begin to add up. In this way, privacy problems resemble
certain environmental harms which occur over time through a series of small acts by different actors. Bartow wants to point to a major spill, but gradual pollution by
a multitude of different actors often creates worse problems. The law frequently struggles with recognizing harms that do not result in embarrassment, humiliation,
or physical or psychological injury.93 For example, after the September 11 attacks, several airlines gave their passenger records to federal agencies in direct
violation of their privacy policies. The federal agencies used the data to study airline security.94 A group of passengers sued Northwest Airlines for disclosing their
personal information. One of their claims was that Northwest Airlines breached its contract with the passengers. In Dyer v. Northwest Airlines Corp., the court
rejected the contract claim because “broad statements of company policy do not generally give rise to contract claims,” the passengers never claimed they relied
upon the policy or even read it, and they “failed to allege any contractual damages arising out of the alleged breach.”95 Another court reached a similar
conclusion.96 Regardless of the merits of the decisions on contract law, the cases represent a difficulty with the legal system in addressing privacy problems. The
disclosure of the passenger records represented a “breach of confidentiality.”97 The problems caused by breaches of confidentiality do not merely consist of
individual emotional distress; they involve a violation of trust within a relationship. There is a strong social value in ensuring that promises are kept and that trust is
maintained in relationships between businesses and their customers. The problem of secondary use is also implicated in this case.98 Secondary use involves data
collected for one purpose being used for an unrelated purpose without people’s consent. The airlines gave passenger information to the government for an entirely
different purpose beyond that for which it was originally gathered. Secondary use problems often do not cause financial, or even psychological, injuries. Instead, the
harm is one of power imbalance. In Dyer, data was disseminated in a way that ignored airline passengers’ interests in the data despite promises made in the privacy
policy. Even if the passengers were unaware of the policy, there is a social value in ensuring that companies adhere to established limits on the way they use
personal information. Otherwise, any stated limits become meaningless, and companies have discretion to boundlessly use data. Such a state of affairs can leave
nearly all consumers in a powerless position. The harm, then, is less one to particular individuals than it is a structural harm. A similar problem surfaces in another
case, Smith v. Chase Manhattan Bank.99 A group of plaintiffs sued Chase Manhattan Bank for selling customer information to third parties in violation of its privacy
policy, which stated that the information would remain confidential. The court held that even presuming these allegations were true, the plaintiffs could not prove
any actual injury: [T]he “harm” at the heart of this purported class action, is that class members were merely offered products and services which they were free to
decline. This does not qualify as actual harm. The complaint does not allege any single instance where a named plaintiff or any class member suffered any actual
harm due to the receipt of an unwanted telephone solicitation or a piece of junk mail.100 The court’s view of harm, however, did not account for the breach of
confidentiality. When
balancing privacy against security, the privacy harms are often characterized in terms of
injuries to the individual, and the interest in security is often characterized in a more broad societal way. The
security interest in the NSA programs has often been defined improperly. In a Congressional hearing, Attorney General
Alberto Gonzales stated: Our enemy is listening, and I cannot help but wonder if they are not shaking their heads in amazement at the thought that anyone would
imperil such a sensitive program by leaking its existence in the first place, and smiling at the prospect that we might now disclose even more or perhaps even
unilaterally disarm ourselves of a key tool in the war on terror.101 The balance between privacy and security is often cast in terms of whether a particular
government information collection activity should or should not be barred. The
issue, however, often is not whether the NSA or other government
agencies should be allowed to engage in particular forms of information gathering; rather, it is what kinds of
oversight and accountability we want in place when the government engages in searches and seizures. The government can
employ nearly any kind of investigatory activity with a warrant supported by probable cause. This is a mechanism of oversight—it
forces government officials to justify their suspicions to a neutral judge or magistrate before engaging in the tactic. For
example, electronic surveillance law allows for wiretapping, but limits the practice with judicial supervision, procedures to minimize the breadth of the wiretapping,
and requirements that the law enforcement officials report back to the court to prevent abuses.102 It is these procedures that the Bush Administration has ignored
by engaging in the warrantless NSA surveillance. The question is not whether we want the government to monitor such conversations, but whether the Executive
Branch should adhere to the appropriate oversight procedures that Congress has enacted into law, or should covertly ignore any oversight. Therefore, the security
interest should not get weighed in its totality against the privacy interest. Rather, what should get weighed is the extent of marginal limitation on the effectiveness
of a government information gathering or data mining program by imposing judicial oversight and minimization procedures. Only in cases where such procedures
will completely impair the government program should the security interest be weighed in total, rather than in the marginal difference between an unencumbered
program versus a limited one. Far too
often, the balancing of privacy interests against security interests takes place in a
manner that severely shortchanges the privacy interest while inflating the security interests . Such is the logic of the
nothing to hide argument. When
the argument is unpacked, and its underlying assumptions examined
and challenged,
we can see how it shifts the debate to its terms , in which it draws power from its unfair advantage. It is time
to pull the curtain on the nothing to hide argument. Whether explicit or not, conceptions of privacy underpin nearly every argument made about privacy,
even the common quip “I’ve got nothing to hide.” As I have sought to demonstrate in this essay, understanding privacy as a pluralistic conception reveals that we
are often talking past each other when discussing privacy issues. By focusing more specifically on the related problems under the rubric of “privacy,” we can better
address each problem rather than ignore or conflate them. The nothing to hide argument speaks to some problems, but not to others. It represents
a
singular and narrow way of conceiving of privacy, and it wins by excluding consideration of the other problems
raised in government surveillance and data mining programs. When engaged with directly, the nothing to hide argument can ensnare,
for it forces the debate to focus on its narrow understanding of privacy. But when confronted with the plurality of privacy problems
implicated by government data collection and use beyond surveillance and disclosure, the nothing to hide argument, in the end,
has nothing to say.
often
When identities are destroyed, there is no value to security
Schneier ‘6 [Bruce Schneier is a fellow at the Berkman Center for Internet & Society at Harvard Law School, a program
fellow at the New America Foundation's Open Technology Institute and the CTO of Resilient Systems. He is the author of
Beyond Fear: Thinking Sensibly About Security in an Uncertain World. Commentary, “The Eternal Value of Privacy”, WIRED, May
18, 2006, http://www.wired.com/news/columns/1,70886-0.html]
The most common retort against privacy advocates -- by those in favor of ID checks, cameras, databases, data mining and
other wholesale surveillance measures -- is this line: "If you aren't doing anything wrong, what do you have to
hide?" Some clever answers: "If I'm not doing anything wrong, then you have no cause to watch me."
"Because the government gets to define what's wrong, and they keep changing the definition." "Because you might do something wrong
with my information." My problem with quips like these -- as right as they are -- is that they accept the premise
that privacy is about hiding a wrong. It's not. Privacy is an inherent human right, and a requirement for
maintaining
the human condition with
dignity and respect. Two proverbs say it best: Quis custodiet custodes ipsos? ("Who watches the
watchers?") and "Absolute power corrupts absolutely." Cardinal Richelieu understood the value of surveillance when he famously said, "If one would give me six
lines written by the hand of the most honest man, I would find something in them to have him hanged." Watch someone long enough, and you'll find something to
arrest -- or just blackmail -- with. Privacy
is important because without it, surveillance information will be abused : to
peep, to sell to marketers and to spy on political enemies -- whoever they happen to be at the time. Privacy protects us from abuses by those
in power, even if we're doing nothing wrong at the time of surveillance. We do nothing wrong when we make love or go to
the bathroom. We are not deliberately hiding anything when we seek out private places for reflection or conversation. We keep private journals, sing in the privacy
of the shower, and write letters to secret lovers and then burn them.
Privacy is a basic human need.
A future in which privacy would face
constant assault was so alien to the framers of the Constitution that it never occurred to them to call out privacy as an explicit right. Privacy was inherent to the
nobility of their being and their cause. Of course being watched in your own home was unreasonable. Watching at all was an act so unseemly as to be inconceivable
among gentlemen in their day. You watched convicted criminals, not free citizens. You ruled your own home. It's intrinsic to the concept of liberty. For
if we
are observed in all matters, we are constantly under threat of correction, judgment, criticism, even plagiarism of our
own uniqueness. We become children, fettered under watchful eyes, constantly fearful that -- either now or in the
uncertain future -- patterns we leave behind will be brought back to implicate us, by whatever authority
has now become focused upon our once-private and innocent acts. We lose our individuality , because
everything we do is observable and recordable. How many of us have paused during conversation in the past fourand-a-half years, suddenly aware that we might be eavesdropped on? Probably it was a phone conversation, although
maybe it was an e-mail or instant-message exchange or a conversation in a public place. Maybe the topic was terrorism, or
politics, or Islam. We stop suddenly, momentarily afraid that our words might be taken out of context, then
we laugh at our paranoia and go on. But our demeanor has changed, and our words are subtly altered. This is
the loss of freedom we face when our privacy is taken from us. This is life in former East Germany, or life in Saddam Hussein's Iraq. And it's our future as we allow an
ever-intrusive eye into our personal, private lives. Too
many wrongly characterize the debate as "security versus privacy."
The real choice is liberty versus control. Tyranny, whether it arises under threat of foreign physical attack or
under constant domestic authoritative scrutiny, is still tyranny. Liberty requires security without intrusion, security plus
privacy. Widespread police surveillance is the very definition of a police state. And that's why we should
champion privacy even when we have nothing to hide.
Mass surveillance is inherently repressive
Greenwald 14 — Glenn Greenwald, journalist who received the 2014 Pulitzer Prize for Public Service
for his work with Edward Snowden to report on NSA surveillance, Founding Editor of The Intercept,
former Columnist for the Guardian and Salon, recipient of the Park Center I.F. Stone Award for
Independent Journalism, the Online Journalism Award for investigative work on the abusive detention
conditions of Chelsea Manning, the George Polk Award for National Security Reporting, the Gannett
Foundation Award for investigative journalism, the Gannett Foundation Watchdog Journalism Award,
the Esso Premio for Excellence in Investigative Reporting in Brazil, and the Electronic Frontier
Foundation’s Pioneer Award, holds a J.D. from New York University School of Law, 2014 (“The Harm of
Surveillance,” No Place To Hide: Edward Snowden, the NSA, and the U.S. Surveillance State, Published by
Metropolitan Books, ISBN 9781627790734, p. 173-174)
Privacy is essential to human freedom and happiness for reasons that are rarely discussed but
instinctively understood by most people, as evidenced by the lengths to which they go to protect their
own. To begin with, people radically change their behavior when they know they are being watched.
They will strive to do that which is expected of them. They want to avoid shame and condemnation.
They do so by adhering tightly to accepted social practices, by staying within imposed boundaries,
avoiding action that might be seen as deviant or abnormal.
The range of choices people consider when they believe that others are watching is therefore far more
limited than what they might do when acting in a private realm. A denial of privacy operates to severely
restrict one’s freedom of choice.
Several years ago, I attended the bat mitzvah of my best friend’s daughter. During the ceremony, the
rabbi emphasized that “the central lesson” for the girl to learn was that she was “always being watched
and judged.” He told her that God always knew what she was doing, every choice, every action, and
even every thought, no matter how private. “You are never alone,” he said, which meant that she
should always adhere to God’s will.
The rabbi’s point was clear: if you can never evade the watchful eyes of a supreme authority, there is no
choice but to follow the dictates that authority imposes. You cannot even consider forging your own
path beyond those rules: if you believe you are always being watched and judged, you are not really a
free individual.
All oppressive authorities — political, religious, societal, parental — rely on this vital truth, using it as a
principal tool to enforce orthodoxies, compel adherence, and quash dissent. It is in their interest to
convey that nothing their subjects do will escape the knowledge of the authorities. Far more effectively
than a police force, the deprivation of privacy will crush any temptation to deviate from rules and
norms.
What is lost when the private realm is abolished are many of the [end page 173] attributes typically
associated with quality of life. Most people have experienced how privacy enables liberation from
constraint. And we’ve all, conversely, had the experience of engaging in private behavior when we
thought we were alone — dancing, confessing, exploring sexual expression, sharing untested ideas —
only to feel shame at having been seen by others.
Only when we believe that nobody else is watching us do we feel free — safe — to truly experiment, to
test boundaries, to explore new ways of thinking and being, to explore what it means to be ourselves.
What made the Internet so appealing was precisely that it afforded the ability to speak and act
anonymously, which is so vital to individual exploration.
For that reason, it is in the realm of privacy where creativity, dissent, and challenges to orthodoxy
germinate. A society in which everyone knows they can be watched by the state — where the private
realm is effectively eliminated — is one in which those attributes are lost, at both the societal and the
individual level.
Mass surveillance by the state is therefore inherently repressive, even in the unlikely case that it is not
abused by vindictive officials to do things like gain private information about political opponents.
Regardless of how surveillance is used or abused, the limits it imposes on freedom are intrinsic to its
existence.
Rights like privacy can’t be “outweighed” on the basis of cost-benefit analysis. This is
especially important in the context of terrorism.
Cole 7 — David Cole, Professor at Georgetown University Law Center, has litigated many significant
constitutional cases in the Supreme Court, holds a J.D. from Yale Law School, 2007 (“Book Review: The
Poverty of Posner's Pragmatism: Balancing Away Liberty After 9/11 (Review of Richard A. Posner’s Not A
Suicide Pact: The Constitution In A Time Of National Emergency),” Stanford Law Review (59 Stan. L. Rev.
1735), April, Available Online to Subscribing Institutions via Lexis-Nexis)
II. The Disappearing Constitution
The general problem with Posner's approach is that it does away with the animating idea of the
Constitution - namely, that it is a form of collective precommitment. The genius behind the
Constitution is precisely the recognition that "pragmatic" cost-benefit decisions of the type Posner
favors will often appear in the short term to favor actions that in the long term are contrary to our own
best principles. Just as we may be tempted to smoke a cigarette tonight [*1746] even though in the
long term we are likely to suffer as a result, so we know collectively that in the short term we are likely
to empower government to suppress unpopular speech, invade the privacy of "dangerous" minorities,
and abuse suspected criminals, even though in the long term such actions undermine the values of free
speech, equality, and privacy that are necessary to democracy and human flourishing. If we were
always capable of rationally assessing the costs and benefits in such a way as to maximize our collective
well-being, short-term and long-term, we might not need a Constitution. But knowing that societies, like
individuals, will be tempted to act in ways that undermine their own best interests, we have
precommitted to a set of constitutional constraints on pragmatic balancing. Posner's view that the
Constitution must bend to the point of authorizing virtually any initiative that seems pragmatic to him
reduces the Constitution to a precommitment to balance costs and benefits, and that is no
precommitment at all.
Constitutional theory demands more than ad hoc balancing. n27 While the nature of competing
interests means that at some level of generality, a balance must be struck, constitutional analysis is not
an invitation to the freewheeling, all-things-considered balance of the economist. Instead, it requires
an effort, guided by text, precedent, and history, to identify the higher principles that guide us as a
society, principles so important that they trump democracy itself (not to mention efficiency). The judge's
constitutional duty was perhaps best captured by Justice John Marshall Harlan, writing about the due
process clause:
Due process has not been reduced to any formula; its content cannot be determined by
reference to any code. The best that can be said is that through the course of this Court's
decisions it has represented the balance which our Nation, built upon postulates of respect for
the liberty of the individual, has struck between that liberty and the demands of organized
society. If the supplying of content to this Constitutional concept has of necessity been a rational
process, it certainly has not been one where judges have felt free to roam where unguided
speculation might take them. The balance of which I speak is the balance struck by this country,
having regard to what history teaches are the traditions from which it developed as well as the
traditions from which it broke. That tradition is a living thing. A decision of this Court which
radically departs from it could not long survive, while a decision which builds on what has
survived is likely to be sound. No formula could serve as a substitute, in this area, for judgment
and restraint. n28
Instead of looking to the Constitution and its jurisprudence as a reflection of our collective effort to
determine the higher principles that should guide us, as Harlan suggests, Posner would start from
scratch, assessing what is best from a pragmatic, open-ended balancing approach that he admits
ultimately involves weighing imponderables.
[*1747] Posner insists that to declare a practice constitutional is not the same as saying that it is
desirable as a policy matter: "Much that the government is permitted by the Constitution to do it should
not do and can be forbidden to do by legislation or treaties" (p. 7). That is certainly true as a theoretical
matter, at least where one's constitutional theory is not reducible to one's policy preferences. But
Posner appears to view questions of constitutionality as simply a matter of weighing all the costs and
benefits, which is surely the same utilitarian calculus the policymaker would use to determine whether a
practice is desirable. Under Posner's approach, then, it is difficult to see why there would be any room
between what is desirable and what is constitutional.
If constitutionalism is to have any bite, it must be distinct from mere policy preferences. In fact, our
Constitution gives judges the authority to declare acts of democratically elected officials
unconstitutional on the understanding that they will not simply engage in the same cost-benefit
analyses that politicians and economists undertake. The very sources Judge Posner dismisses - text,
precedent, tradition, and reason - as unhelpful in the face of the threat of catastrophic terrorism are
absolutely essential to principled constitutional decision-making. It is true that text, precedent, tradition,
and reason do not determine results in some mechanistic way. That is why we ask judges, not machines,
to decide constitutional cases. But these sources are nonetheless critically important constraints on and
guides to constitutional decision-making. They are what identify those principles that have been
deemed fundamental - and therefore constitutional - over our collective history.
The Framers of the Constitution did not simply say "the government may engage in any practice whose
benefits outweigh its costs," as Judge Posner would have it. Instead, they struggled to articulate a
limited number of fundamental principles and enshrine them above the everyday pragmatic judgments
of politicians. They foresaw what modern history has shown to be all too true - that while democracy is
an important antidote to tyranny, it can also facilitate a particular kind of tyranny - the tyranny of the
majority. Constitutional principles protect those who are likely to be the targets of such tyranny, such as
terror suspects, religious and racial minorities, criminal defendants, enemy combatants, foreign
nationals, and, especially in this day and age, Arabs and Muslims. Relegating such individuals to the
mercy of the legislature denies the existence of that threat. The Constitution is about more than
efficiency and more than democracy; it is a collective commitment to the equal worth and dignity of
all human beings. To fail to see that is to miss the very point of constitutional law.
Posner's trump card is that because terrorism in the twenty-first century poses the risk of truly
catastrophic harm, it renders constitutional precedent and history largely irrelevant. Everything has
changed. We are in a new paradigm, in which, as Alberto Gonzales said of the Geneva Conventions, the
old rules (apparently including even those enshrined in the Constitution) are now [*1748] "quaint" or
"obsolete." n29 But each new generation faces unforeseen challenges. The advent of modern weaponry
changed war as we knew it. Communism backed by the Soviet Union posed a "new" threat of
totalitarian takeover. The development of the nuclear bomb ushered in yet another new era. This is not
to deny that there is a real threat that terrorists may get their hands on weapons of mass destruction,
and that this threat must be taken very seriously. But it is to insist on what is a truly conservative point that principles developed and applied over two centuries still have something important to say in
guiding us as we address the threat of modern terrorism.
The corollary to Posner's pragmatic and utilitarian balancing approach to the Constitution is that judges
should defer to the political branches on national security questions. Judges have no special expertise in
national security, he argues, while the political branches do (p. 9). Decisions invalidating security
measures as unconstitutional reduce our flexibility, for they are extremely difficult to change through
the political process, and may cut off avenues of experimentation (p. 27). But the Constitution was
meant to cut off certain avenues. Trying suspected terrorists without a jury, locking them up without
access to a judge, convicting them without proving guilt beyond a reasonable doubt, searching them
without probable cause or a warrant, and subjecting them to torture all might make terrorists' tasks
more difficult (although, as I have argued elsewhere, many of these shortcuts actually help the terrorists
and make us more vulnerable, because of the backlash they provoke). n30 But while the Constitution
may not be a "suicide pact," neither is it a license to do anything our leaders think might improve our
safety.
SOLVENCY
An Omnibus bill that ends multiple surveillance authorities solves.
Cohn ‘13
(et al; Cindy Cohn is the Executive Director of the Electronic Frontier Foundation. From 2000-2015 she served as EFF’s Legal
Director as well as its General Counsel. The National Law Journal named Ms. Cohn one of 100 most influential lawyers in
America. “NSA Spying in Congress: Stop the Intelligence Committee and What to Watch For in Upcoming Bills” - Electronic
Frontier Foundation - October 23, 2013 - https://www.eff.org/deeplinks/2013/10/nsa-spying-congress-stop-intelligencecommittee-and-what-watch-upcoming-bills)
The good bills being proposed are omnibus bills —so-called because they change a variety of different laws.
They try to stop the mass collection of innocent Americans' calling records (using Section 215 of the Patriot
Act), phone calls and emails (using Section 702 of the Foreign Intelligence Surveillance Act (FISA)), and try to
introduce much needed transparency reforms to the court overseeing the spying, the Foreign Intelligence Surveillance Court (FISA Court). So far, only S. 1551, the
Intelligence Oversight and Surveillance Reform Act—sponsored by Senators Ron Wyden, Richard Blumenthal, Mark Udall, and Rand Paul—has been released. The
bill is a fantastic start. The other, by Senator Patrick Leahy and Rep. Jim Sensenbrenner, is still being readied, but we’re hopeful based on what we’ve heard so far. In
general, EFF believes that
whatever bill goes through Congress must stop the mass spying ; either through nullifying the NSA’s
interpretation of Section 215, or otherwise. And it should do so in a publicly verifiable way. It goes without saying that this is, among other things, in addition to
Direct path: Forbid Mass Collection There
is a direct way to do this. Congress could unequivocally forbid the government from the mass collection of
phone records. Congress usually does this with the phrase “notwithstanding any other law.” This is the path
EFF strongly recommends. It looks something like below and includes FISA’s exceptions for wartime and
other emergencies. Notwithstanding any other law, no governmental entity shall engage in the mass
collection of records1, unless the collection is authorized pursuant to sections 1802, 1811, 1843 or 1844 of this
chapter.
reforming the FISA Court process, increasing transparency, and fixing National Security Letters.
Complete Elimination of unwarranted surveillance is key.
Matthews ‘14
(Kevin Matthews – OpEd writer and contributor at Care2.com and Truthout - “4 Reasons Obama’s NSA “Reforms” Won’t
Change Much” - Care2 - March 25, 2014 - http://www.care2.com/causes/4-reasons-obamas-nsa-reforms-wont-changemuch.html#ixzz3by65iMRe)
It Legitimatizes a Divisive Issue Although the reform is not nearly as meaningful as many Americans had
hoped for, some support it because it seems like better than nothing. However, the administration may
be offering minor concessions on its spying program in an attempt to get unwarranted surveillance on the books.
With many believing that the NSA has been conducting unlawful surveillance, passing this new legislation
would give some legitimacy to the practice. By cementing surveillance into law, it could further help to
squash debate on the subject. Perhaps that’s why Obama is calling on Congress to pass these NSA reforms “quickly.” (And by “quickly”, he really
means nearly a year after Edward Snowden brought these misdeeds to our attention.)
Download