GMU Patriot Debate Institute 2013 1 File Title Wiretapping and Surveillance Pro/Con Wiretapping and Surveillance Pro/Con ........................................................................................................................................................... 1 ***Definitions ................................................................................................................................................................................................. 2 Domestic ...................................................................................................................................................................................................... 3 In The US..................................................................................................................................................................................................... 4 Justified ........................................................................................................................................................................................................ 5 Security ........................................................................................................................................................................................................ 6 Surveillance ................................................................................................................................................................................................. 7 Suspect ......................................................................................................................................................................................................... 8 Use ............................................................................................................................................................................................................... 9 Wiretapping ............................................................................................................................................................................................... 10 *** Pro ........................................................................................................................................................................................................... 11 Wiretapping Good – Economy .................................................................................................................................................................. 12 Wiretapping Good – Economy .................................................................................................................................................................. 13 Wiretapping Good – Economy .................................................................................................................................................................. 15 Wiretapping Good – Economy .................................................................................................................................................................. 17 Wiretapping Good – Economy .................................................................................................................................................................. 18 Wiretapping Good – Terrorism .................................................................................................................................................................. 19 Wiretapping Good – Terrorism .................................................................................................................................................................. 20 Wiretapping Good – Terrorism .................................................................................................................................................................. 22 Wiretapping Good – Terrorism .................................................................................................................................................................. 24 Wiretapping Good – Legal ........................................................................................................................................................................ 25 Wiretapping Good – Legal ........................................................................................................................................................................ 27 Wiretapping Good – Legal ........................................................................................................................................................................ 28 Wiretapping Good – Crime........................................................................................................................................................................ 29 Wiretapping Good – Organized Crime Impact .......................................................................................................................................... 30 Wiretapping Good – A2: Privacy .............................................................................................................................................................. 31 Wiretapping Good – A2: Credibility ......................................................................................................................................................... 33 *** Con.......................................................................................................................................................................................................... 34 Wiretapping Bad – A2: Terrorism ............................................................................................................................................................. 35 Wiretapping Bad – Digital Infrastructure .................................................................................................................................................. 36 Wiretapping Bad – Credibility ................................................................................................................................................................... 37 Wiretapping Bad – Credibility ................................................................................................................................................................... 39 Wiretapping Bad – Credibility ................................................................................................................................................................... 40 Wiretapping Bad – Credibility ................................................................................................................................................................... 42 Wiretapping Bad – Credibility/Obama ...................................................................................................................................................... 45 Wiretapping Bad – Not Legal .................................................................................................................................................................... 47 Wiretapping Bad – Privacy ........................................................................................................................................................................ 49 Wiretapping Bad – Freedom ...................................................................................................................................................................... 51 Wiretapping Bad – Foreign Relations – EU .............................................................................................................................................. 64 Wiretapping Bad – Foreign Relations – Germany ..................................................................................................................................... 66 RESOLUTION: The use of domestic wiretapping and surveillance in the United States is justified. GMU Patriot Debate Institute 2 File Title 2013 ***Definitions GMU Patriot Debate Institute 3 File Title 2013 Domestic Domestic (adj.) of or pertaining to one's own or a particular country as apart from other countries: domestic trade. (dictionary.com) GMU Patriot Debate Institute 4 File Title 2013 In The US In the U.S.: Physically residing, created, or formed in the physical boundaries of the U.S.; is a resident of or takes place in Beliefs, ideas, or tangible events that took place or still hold true within U.S. mass culture In (the United States) (prep.) (used to indicate inclusion within something abstract or immaterial): in politics; in the autumn. (dictionary.com) GMU Patriot Debate Institute 5 File Title 2013 Justified Justified: M: to provide or be a good reason for (something) : to prove or show (something) to be just, right, or reasonable D: (Law): To show a satisfactory reason or excuse for something to be done Justified (v.) to provide a good reason for the actions of (someone). (merriam-webster.com) accepted by society. acknowledged to have purpose. to have beneficial reason. purposeful in advancement. beneficial in the advancement of the subject; chopping down the trees was justified un the tribe’s need for expansion. GMU Patriot Debate Institute 6 File Title 2013 Security Security (n.) the state of being protected or safe from harm. (merriam-webster.com) National Security (n.) a collective term for the defense and foreign relations of a country, protection of the interests of a country. (dictionary.com) GMU Patriot Debate Institute 7 File Title 2013 Surveillance Surveillance: D:close observation or supervision maintained over a person, group,etc, esp one in custody or under suspicion M: the act of carefully watching someone or something especially in order to prevent or detect a crime Surveillance (n.) a watch kept over a person, group, etc., especially over a suspect, prisoner, or the like: The suspects were under police surveillance. (dictionary.com) GMU Patriot Debate Institute 8 File Title 2013 Suspect Suspect (n.) someone who is not able to be trusted. (merriam-webster.com) GMU Patriot Debate Institute 9 File Title 2013 Use Use (n.) the act of employing, using, or putting into service: the use of tools. (dictionary.com) GMU Patriot Debate Institute 10 File Title 2013 Wiretapping Wiretapping (v.) to listen in on by means of a wiretap; to wiretap a telephone; to wiretap a conversation. (dictionary.com) Listen (in on) (v.) to make an effort to hear or pay close attention to someone or something. (yourdictionary.com) GMU Patriot Debate Institute 11 File Title 2013 *** Pro GMU Patriot Debate Institute 2013 12 File Title Wiretapping Good – Economy Wiretapping is good for the economy Goral, Editor-in-Chief of University Business Magazine, 06 (Tim, “Higher Ed Coalition Fights Wiretapping Rules: New FCC Regulations Give the Feds Acess to Internet, Phone Services.” 6-302014, http://www.questia.com/magazine/1G1-143437261/higher-ed-coalition-fights-wiretapping-rules-new, MR. A COALITION OF 14 EDUCATION GROUPS LED by the American Council on Education filed suit in January against the Federal Communications Commission to block new surveillance rules from taking effect. Behind the concern is the 1994 Communications Assistance for Law Enforcement Act (CALEA) that requires telecommunications companies to enable wiretaps by law enforcement agencies. Last fall, the FCC amended CALEA to include broadband access and internet phone services--the kind found at colleges and universities. The Bush administration contends the new capabilities will help fight terrorism, yet others worry about privacy violations--not to mention the expense of complying with the rules. "If CALEA requires the replacement of a substantial portion of network equipment, the cost to the entire higher education community could total billions of dollars," the brief reads. Citing the careful long-range planning that goes into technology expenditures, ACE--along with the Association of American Universities, the American Association of Community Colleges, and others--maintains that the compliance target of spring 2007 would require funding to be diverted from other programs, resulting in possible course eliminations and tuition increases. While economics are at the forefront of the controversy, the suit also speaks to concerns about growing government intrusions on privacy and free speech. Many believe the government's actions cast a pall over constitutionally guaranteed freedoms. The American Civil Liberties Union sued the National Security Agency, also in January, to stop illegal domestic surveillance. GMU Patriot Debate Institute 2013 13 File Title Wiretapping Good – Economy Good for the economy Schwartz, Professor UC Berkeley School of Law, 09 (Paul, “Law and technology Keeping track of telecommunications surveillance.” 6-30-2014, ebsco, MR.) It is also a matter of great concern for the general public. Surpris- ingly enough, however, the phenom- enon of telecommunications surveil- lance is poorly measured in the U.S. at present. As a result, any attempt at rational inquiry about telecommuni- cations surveillance is hampered by the haphazard and incomplete infor- mation the U.S. government collects about its own behavior and activities. Neither the U.S. government nor outside experts know basic facts about the level of surveillance prac- tices. As a consequence, U.S. citizens have limited ability to decide if there is too much or too little telecommu- nications surveillance. It is also im- possible to determine if telecommu- nications surveillance is increasing or decreasing, or if law enforcement is using its surveillance capacities most effectively.4 Ideally, it would be possible to reach conclusions about these issues by examining data about U.S. government surveillance practices and their results. As a general model, federal and state crime statistics are publicly available and criminologists pore over these databases to spot trends and determine police activities that are ef- fective. No such database is available about the full range of telecommuni- cations surveillance. The Telecommunications Surveillance index Congress should create one annual report card that measures and pub- licizes government’s performance of telecommunications surveillance. This index will replace the bits and pieces of scattered reports that dif- ferent governmental entities some- times release. Such an index will allow year-by-year comparisons of changes in the levels of government telecommunications surveillance and permit meaningful judgments about the extent of privacy invasions and the effectiveness of the activity. In this column, I describe the gap left by the reporting provisions in current statutes, which create only an incomplete and discontinuous picture of the governmental activity. The creation of an annual telecom- munications surveillance index is an urgent matter, and I will conclude by discussing four issues related to this necessary task. To understand the shortcomings of the statutes that permit U.S. telecom- munications surveillance, one needs a sense of how they collect information about government use. The critical statutory regulations are the Wiretap Act; the Pen Register Act; the Stored Communications Act; the Foreign Intelligence Surveillance Act (FISA); and the different provisions for Na- tional Security Letters. The first three laws concern the use of surveillance for domestic purposes— that is, in the context of ordinary criminal investiga- tions. The last two statutes regulate the use of surveillance for foreign in- telligence purposes, such as counter- terrorism. And, in a nutshell, the most public information is generated about the U.S. government’s use of the Wire- tap Act. Yet, this law in many ways has become less important than other telecommunications surveillance stat- utes, and we know far less about the use of these other statutes. Telecommunications Surveillance for criminal investigations A review of the legal basis for telecom- munications surveillance starts, logi- cally, with the Wiretap Act, which is the oldest of the modern statutory au- thorities in this area. Enacted in 1968, the Wiretap Act sets a high statutory standard before the government can “intercept” a “wire or oral communi- cation.” It also requires the govern- ment to publish relatively detailed data sets about its use. The Wiretap Act assigns the task of collecting this information to the Administrative Office of the United States Courts, which then publishes the statistics.1 What is the problem then? The dif- ficulty is that the Wiretap Act regu- lates only the capturing of the content of messages contemporaneously with their transmission. As an example of its coverage, if law enforcement wish- es to intercept a telephone call as it is occurring, the Wiretap Act will apply. Yet, technological changes have created a variety of information that falls outside the Wiretap Act, whether be- cause it is “telecommunications attri- butes” rather than content, or stored on a server. Telecommunications at- tributes are generally regulated by the Pen Register Act, and information stored on a server generally falls under the Stored Communications Act. I will consider each law in turn. The Pen Register Act, as first enacted in 1986, regulated only access to telephone numbers dialed from a spe- cific phone, or received by it. Today, the Pen Register Act, as amended by the Patriot Act in 2001, more broadly regulates access to “dialing, routing, addressing, or signaling informa- tion.” Examples of such information are IP addresses and email address- ing information. Like the Wiretap Act, the Pen Reg- ister Act requires collection of infor- mation about its use. Yet, reports pur- suant to it are far less detailed than those under the Wiretap Act, and the U.S. government does not make them publicly available. And perhaps the greatest surprise is that Congress has shown scant interest in even ensur- ing it actually receives the informa- tion to which it is statutorily entitled from the Department of Justice. Overall, the situation is reminiscent of the anarchic administrative conditions prior to the New Deal’s creation of the Federal Register and other means for the orderly publication of govern- mental records. As a further shortcoming, pen reg- ister reports only list federal collection of information pursuant to the law. If use of the Pen Register Act follows the pattern of the Wiretap Act, however, states are now engaging in far greater use of their authority than are federal law enforcement authorities. The third statutory authority for telecommunications surveillance is the Stored Communications Act. This statute is particularly significant today because so many kinds of telecommu- nications occur in asynchronous fash- ion. For example, sending an email message may be the most prevalent form of telecommunications in the U.S. today. Yet, an email message is in transmission, as the GMU Patriot Debate Institute 2013 14 File Title term is under- stood under the Wiretap Act, for only a short period. Transmission is the time it takes from clicking on the “send” command to the moment the mes- sage arrives at the server of the recipi- ent’s ISP. Rather than recourse to the Wiretap Act, law enforcement typical- ly seeks collection of email from ISPs under the Stored Communications Act, which contains requirements for obtaining access to information that are generally less rigorous than under the Wiretap Act. Despite the centrality of the Stored Communications Act, there are almost no official statistics collected about law enforcement’s use of this statute. This statute contains only a single re- porting exception, which regards dis- closure in an emergency. Information about its use is given to House and Senate committees, but is not made publicly available at present. In this regard, Switzerland offers a step in the right direction: in that country, the Federal Department of Justice and the police publish annual information about the number of orders for stored information.2 Telecommunications Surveillance for foreign intelligence Purposes The three statutory authorities thus far surveyed all regulate access to tele- communications information for do- mestic law enforcement purposes. On the intelligence side, FISA provides the chief statutory regulation for the gov- ernment’s collection of information about foreign intelligence within the U.S. In addition to FISA, several statutes permit the FBI to obtain personal information from third parties through National Security Letters (NSLs). A NSL is a written directive from the FBI in cases involving national security; it does not require judicial review. FISA requires the Department of Justice to file annual reports with Con- gress and the Administrative Office of the Courts. These reports provide merely skeletal information about the use of FISA authorities. FISA also requires the Attorney General to file reports with the Senate and House regarding all uses of pen register de- vices, pursuant to this statute. This in- formation is made publicly available. As for the NSLs, in its reauthoriza- tion of the Patriot Act in 2005, Con- gress required two important kinds of information to be collected about this kind of information gathering. First, it expanded an existing reporting re- quirement that sent information to Congress, and required annual pub- lic data on the FBI’s request for NSLs. Second, the law required the Depart- ment of Justice to carry out audits of the use of NSLs. The resulting audits have already demonstrated substan- tial underreporting of the actual num- ber of NSLs and misuse of statutory authorities. Steps to Take As I’ve described here, there is cur- rently inadequate data about telecom- munications surveillance in the U.S. I conclude by discussing four themes related to creation of a national tele- communications surveillance index. First, a central role should be given to the Administrative Office of the U.S. Courts, as under the Wiretap Act, in collecting and publicizing telecom- munications surveillance statistics. Since 1968, the Administrative Office has successfully carried out this role pursuant to the Wiretap Act, and the other applicable statutes should be amended so that applicable informa- tion goes to this entity. Second, the annual index should include information about all statu- tory authorities, not just the Wiretap Act. As noted earlier, this statute is less important as a source of statutory authorization for surveillance activity than the Stored Communications Act and other statutes. Third, one of the most difficult tasks in creating an annual report card will be harmonizing the information col- lected within a single index. The goal is clear: to provide a picture of how activities in different statutory areas relate to each other. Nonetheless, development of a workable yardstick raises a series of complex issues be- cause each statute sweeps in different kinds of data and, sometimes subtly, different kinds of surveillance. Fourth, telecommunications sur- veillance statutes should increase independent audit functions. It is essential to have an independent as- sessment of the accuracy of the sup- plied data and the completeness of supplied reports. As part of this as- sessment, the use of statistical sam- pling of case files will be a useful technique. The Inspector General of the Department of Justice has already taken this approach in assessing use of NSLs pursuant to its audit author- ity. In an international illustration of this methodology, the Max Planck In- stitute for Foreign and International Criminal Law published an ambitious statistical analysis of a sample of tele- communications surveillance orders issued in Germany.3 The twin goals of an annual tele- communications surveillance index should be to minimize the impact of surveillance on civil liberties and to maximize its effectiveness for law en- forcement. There is a compelling need at present for Congress to require sta- tistical benchmarks to accompany all the laws that authorize telecommunications surveillance. GMU Patriot Debate Institute 2013 15 File Title Wiretapping Good – Economy Wiretapping good for the economy Sanchez, Senior Fellow Cato Institute, 10 (Julian, “Wiretapping the Internet.” 6-30-2014 http://www.cato.org/publications/commentary/wiretapping-internet, MR.) This article appeared on The American Prospect (Online) on October 4, 2010. Taking a cue from the authoritarian regimes of Saudi Arabia and the United Arab Emirates, American law-enforcement and intelligence agencies are seeking to re-engineer the Internet and other digital communications networks to make them easier to spy on. In the week since the plan became public, it has been roundly condemned by civil liberties groups and security experts — and rightly so. While the proposal described in Monday’s New York Timesprobably won’t do much to hinder sophisticated criminals or terrorists, it does threaten to undermine the security of global communications and stifle technological innovation. The details are still being hammered out, but the Times reports that next year the Obama administration will seek legislation requiring telecoms, online services, and software companies that enable encrypted communications — from instant messaging to Voice over IP — to build back doors into their systems for the government, guaranteeing law enforcement the ability to unscramble their users’ conversations. Foreign communications companies doing business in the U.S. would have to build local facilities for more convenient eavesdropping. “One could argue that these are costs worth bearing if the government’s plan had a prayer of actually working, but it doesn’t.” The FBI, true to form, claims that these broad new mandates aren’t an expansion of power but merely an update aimed at “preserving our ability to execute our existing authority.” And the proposal does bear a superficial similarity to the Communications Assistance for Law Enforcement Act of 1994, which required telecoms to ensure that their new digitally switched networks were as wiretap-friendly as the old analog phone system. But the current proposal is far more radical, in part because the Internet is not much like a traditional phone network. To see why, consider Skype, a popular program that allows users to conduct secure text chats, phone conversations, video conferences, and file transfers. Skype is designed as a distributed peer-to-peer network, meaning there’s no central hub or switching station through which calls are routed; only the login server used to register members as they sign on to the network is centralized. Calls are encrypted end-to-end, meaning that only the end users who are parties to a call hold the secret keys to secure the conversation against online snoops. There’s no device Skype can install at their headquarters that would let them provide police with access to the unencrypted communications; to comply with such a mandate, they’d have to wholly redesign the network along a more centralized model, rendering it less flexible, adaptable, and reliable as well as less secure. Skype is just one of the thousands of firms, large and small, that would be burdened with the obligation to design their systems for breach. We’ve already seen how this can cause security vulnerabilities on traditional phone networks: In 2005, it was discovered that unknown hackers had exploited wiretap software built into Vodaphone Greece’s computer system for law-enforcement use to eavesdrop on the cellular phone conversations of high Cabinet officials and even the prime minister. Designing for surveillance means, more or less by definition, designing a less secure, more vulnerable infrastructure. It’s for just this reason that similar proposals were wisely rejected during the Crypto Wars of the 1990s, a decision that helped give rise to a thriving online economy that’s wholly dependent on strong encryption. It’s not just hackers who could exploit such vulnerabilities, of course. A network architecture designed for the convenience of American law enforcement also necessarily makes eavesdropping easy for the many regimes whose idea of a “national-security threat” includes political dissent or blasphemous speech. And there’s always the threat of interception by insiders: An engineer at Google was recently fired for using his privileged access to snoop into the private accounts of several teenage users. One way to alleviate such concerns is for firms like Google to enable end-to-end encryption, so users can feel secure that even the company’s own employees won’t have the keys needed to read their communications. The government’s proposal would deny them the ability to make that promise. Companies in the burgeoning cloud-computing sector know full well that businesses and consumers alike are eager to take advantage of the convenience and flexibility of cloud services but are also skittish about entrusting extremely valuable data to third parties. At a recent Capitol Hill hearing, a panoply of high-tech executives testified that the complexity and unpredictability of American surveillance law, as well as the relatively weak protections afforded to data stored in the cloud, were hampering the adoption of cloud services and placing U.S. companies at a disadvantage relative to foreign competitors. The government’s proposal would only exacerbate the problem. One could argue that these are costs worth bearing if the government’s plan had a prayer of actually working, but it doesn’t. There are already a plethora of open-source encryption tools freely available on the Internet, which sophisticated terrorists and criminal enterprises will have even greater incentive to use once we’ve announced that the encryption built into communication services can’t be trusted. That’s a genie there’s no way to rebottle. Fortunately, law enforcement still has a recourse that makes it unnecessary to impose architectural mandates on tech companies or weaken the security of all our communications. They can get old-fashioned physical search warrants and bug the devices used by their GMU Patriot Debate Institute 2013 16 File Title suspects. Less convenient, to be sure, but with the advantage of not imposing massive economic and privacy costs on everyone who isn’t a suspect. There is one type of surveillance that genuinely would be rendered impractical by widespread use of secure communications, however. Known individual suspects can be targeted by other means, but if the government wanted to do wholesale surveillance, in which the whole communications stream is automatically analyzed and filtered by artificial intelligence software hunting for suspicious communications by unknown parties — as several accounts have suggested the National Security Agency did under the warrantless wiretapping program authorized by President George W. Bush — they really would need a back door at the system level. But while governments may consider it a bug when network architecture renders such sweeping surveillance infeasible, citizens should probably regard it as a feature. It’s hard to blame harried law-enforcement officials for wishing they could freeze time or control disruptive technological changes. They can’t, of course, but they could do a great deal of damage to both the high-tech economy and the security of global communications before they figure that out. GMU Patriot Debate Institute 2013 17 File Title Wiretapping Good – Economy Wiretapping good for the economy Electronic Frontier Foundation, leading nonprofit organization defending civil liberties in the digital world, N.d (“NSA Spying on Americans.” 6-30-2014, https://www.eff.org/nsa-spying, MR.) The US government, with assistance from major telecommunications carriers including AT&T, has engaged in a massive illegal dragnet surveillance of domestic communications and communications records of millions of ordinary Americans since at least 2001. Since this was first reported on by the press and discovered by the public in late 2005, EFF has been at the forefront of the effort to stop it and bring government surveillance programs back within the law and the Constitution. News reports in December 2005 first revealed that the National Security Agency (NSA) has been intercepting Americans’ phone calls and Internet communications. Those news reports, combined with a USA Today story in May 2006 and the statements of several members of Congress, revealed that the NSA is also receiving wholesale copies of American's telephone and other communications records. All of these surveillance activities are in violation of the privacy safeguards established by Congress and the US Constitution. In early 2006, EFF obtained whistleblower evidence (.pdf) from former AT&T technician Mark Klein showing that AT&T is cooperating with the illegal surveillance. The undisputed documents show that AT&T installed a fiberoptic splitter at its facility at 611 Folsom Street in San Francisco that makes copies of all emails web browsing and other Internet traffic to and from AT&T customers and provides those copies to the NSA. This copying includes both domestic and international Internet activities of AT&T customers. As one expert observed, “this isn’t a wiretap, it’s a country-tap.” Secret government documents, published by the media in 2013, confirm the NSA obtains full copies of everything that is carried along major domestic fiber optic cable networks. In June 2013, the media, led by the Guardian and Washington Post started publishing a series of articles, along with full government documents, that have confirmed much of what was reported in 2005 and 2006 and then some. The reports showed - and the government later admitted - that the government is mass collecting phone metadata of all US customers under the guise of the Patriot Act. Moreover, the media reports confirm that the government is collecting and analyzing the content of communications of foreigners talking to persons inside the United States, as well as collecting collecting much more, without a probable cause warrant. Finally, the media reports confirm the “upstream” collection off of the fiberoptic cables that Mr. Klein first revealed in 2006. EFF is fighting these illegal activities in the courts. Currently, EFF is representing victims of the illegal surveillance program in Jewel v. NSA, a lawsuit filed in September 2008 seeking to stop the warrantless wiretapping and hold the government and government officials behind the program accountable. In July 2013, a federal judge ruled that the government could not rely on the controversial ‘state secrets’ privilege to block our challenge to the constitutionality of the program. This case is being heard in conjunction with Shubert v. Obama, which raises similar claims. Also in July, 2013, EFF filed another lawsuit, First Unitarian v. NSA, based on the recently published FISA court order demanding Verizon turn over all customer phone records including who is talking to whom, when and for how long — to the NSA. This so-called “metadata,” especially when collected in bulk and aggregated, allows the government to track the associations of various political and religious organizations. The Director of National Intelligence has since confirmed that the collection of Verizon call records is part of a broader program. In addition to making the same arguments we made in Jewel, we argue in UnitarianFirst Unitarian v. NSA that this type of collection violates the First Amendment right to association. Previously, in Hepting v. AT&T, EFF filed the first case against a cooperating telecom for violating its customers' privacy. After Congress expressly intervened and passed the FISA Amendments Act to allow the Executive to require dismissal of the case, Hepting was ultimately dismissed by the US Supreme Court. GMU Patriot Debate Institute 2013 18 File Title Wiretapping Good – Economy Wiretapping helps the economy Magallanes, telecommunications law firm owner, 11 (Raul, “Satellite Policies: Wiretapping and Telecom.”6-30-2014, http://eds.b.ebscohost.com.mutex.gmu.edu/ehost/detail?sid=414a45e937c9-4a02-a7423a497d5d5954%40sessionmgr112&vid=7&hid=115&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#db=bth&AN=59352272, MR. Government eavesdropping on private communications is as old as government itself. Telecommunications providers are but an instrument for governmentwiretapping. As blunt as this may sound and regardless of whether this practice is justified, this is the relationship between law enforcement agencies and private telecom providers. The issue of whether government should eavesdrop on its citizens is left to constitutional lawyers, but there are extents to which telecom providers are required to cooperate. The Wiretapping Law In 1994, the U.S. Congress passed the Communications Assistance for Law Enforcement Act (CALEA) in response to concerns that emerging technologies, such as digital and wireless communications, were making it increasingly difficult for law enforcement to execute authorized surveillance. Wiretapping authority actually is derived from the Electronics Communications Privacy Act, and a court order is required before any such surveillance can take place. What CALEA does is impose a duty on telecommunications carriers to cooperate with law enforcement in surveillance efforts. The 1990s represented the technological culmination of a transition from circuit-switched to packet telephony and from analog to digital communications. Similarly, the new millennium prompted a revision of CALEA regulations due to the emergence of Internet-related technologies. Thus, CALEA obligations were extended to facilities-based broadband providers, and interconnected VoIP providers. Satellite Service Providers and CALEA The answer to the question whether satellite service providers are subject to CALEA lies with the type of services they offer; most importantly, whether they provide broadband services. A facilities-based carrier owns transmission facilities and/or routing equipment. A service is defined as broadband when data rates are at least 200 Kbps. Hence, a satellite service provider that provides facilities-based broadband access most likely would be subject to CALEA. Furthermore, a satellite service provider also may qualify as an interconnected VoIP provider. To do so, the provider would have to facilitate two-way voice communications to the Public Switched Telephone Network (PSTN) over broadband, where the customer used IP-compatible equipment (e.g., the Vonage model). On the other hand, it is quite possible that satellite service providers only provide enterprise solutions to private networks. In this case, CALEA obligations would not apply. However, the private network must be totally isolated from public access (PSTN or the Internet). How to Comply with CALEA Telecom carriers subject to CALEA can comply in any of three ways: 1. 1. Develop a customized solution Carriers can develop their own customized hardware and software solution to comply with CALEA. In this case, carriers deal directly with the law enforcement agency. 1. 2. Purchase a solution from manufacturers Carriers can purchase CALEA-compatible equipment and install it in their networks. Here again, carriers deal directly with the law enforcement agency. 1. 3. Outsource a solution to a third party CALEA allows compliance through trusted third parties (TTPs). In essence, carriers subject to CALEA may give TTPs equipment access for purposes of court-ordered wiretaps. The TTP interfaces with the law enforcement agency and takes care of setting up the tap. TTPs typically charge an initial setup fee and a monthly fee, plus a separate fee for each requested tap. Compliance through TTPs remains the most popular option. Conclusion The era of bug-ready telecom equipment is here. Some argue that with tap-compatible equipment, the danger is that if law enforcement has the ability to tap, so can a hacker. Unfortunately, there is not much room for argument, as providers must nonetheless abide by the statute. The practical thing to do is to make CALEA-compliant equipment part of your network planning. There are harsh federal penalties for failing to comply. Service providers should carefully look at their services to decide whether compliance is required, and if so, implement the solution that works best for them. GMU Patriot Debate Institute 2013 19 File Title Wiretapping Good – Terrorism Domestic wiretapping is critical to counter-terrorism efforts---majority of experts concludes Sorcher 13 Sara Sorcher, National Security Staff Writer for National Journal covering business of war, “Insiders: NSA's Communications Surveillance Good Way to Target Terrorists” National Journal, http://www.nationaljournal.com/nationalsecurity/insiders-nsa-s-communications-surveillance-good-way-to-target-terrorists-20130624, July 1, 2013, NS The National Security Agency's surveillance programs are effective tools for seeking out terrorists, according to 85.5 percent of National Journal's National Security Insiders. "In the digital age, when every individual's digital trail increases year by year, there is no faster way to draw a picture of a network, or a conspiracy, than by piecing together different data streams," one Insider said. "This capability, in years to come, won't be a nice-tohave; it'll be critical." Another Insider said that the NSA must have the tools necessary to root out terrorists or another 9/11 becomes not just possible, but certain. "If we eliminate the online- and phone-surveillance programs and a dirty bomb explodes in an American city, we have only ourselves to blame," the Insider said. "The days of gentlemen not reading other gentlemen's mail are over." Some Insiders note that individual identities and habits are already tracked intensely in the commercial sphere. "I have been fingerprinted at Disneyland and Universal Studios," one said. "When you board a plane in the U.K., your picture is taken before you get on. When you cross a border into the U.S., video is taken of your license plate. Cruise ships require photo IDs be made. Amazon and Google have consumer avatars created for customers and users. Financial institutions routinely collect and track data on customers. When we drive over sensors on a road they collect metadata to establish patterns to improve flow and safety. Whatever NSA may be doing pales in scale to what is happening in plain view." Even backers of government surveillance have some reservations about it, though. "The real question is whether a somewhat better counterterror program is worth the price in civil liberties," one Insider said. "This program has reasonably strong oversight, but I'm skeptical all the same." "They are ONE reasonably good way to target some of the less sophisticated terrorist activities, but by no means an end-all," another said. "Whether it's cost effective is another matter." A 14.5 percent minority opposes the programs. "It is like adding hay to the stack allowing us to miss the needles, at the sacrifice of freedom," one Insider said. "As a constitutional lawyer, President Obama should know better, and I say that as a Democrat." "The coverage is way too broad; gather a ton, find a mouse seems to be the approach." Two-thirds of Insiders agreed with Director of National Intelligence James Clapper, who said the leaks of the NSA's online surveillance would damage U.S. intelligence-gathering capabilities. "Through the revelations, foreign terrorists will learn more about U.S. intelligence tactics, techniques, and procedures that are used to pursue and identify them," one Insider said. "This will spur and aid terrorists to employ more countermeasures, such as increasing the use of anonymizing techniques and encryption in their communications." Still, these Insiders disagreed on the severity of lasting damage stemming from the leaks. "I understand why Clapper said what he did," one Insider said. "However the program will continue on. And our enemies will continue to use phone lines." GMU Patriot Debate Institute 2013 20 File Title Wiretapping Good – Terrorism Wiretapping prevents terrorist attacks Sullivan 13 Sean Sullivan, Writer at Washington Post, “NSA head: Surveillance helped thwart more than 50 terror plots,” http://www.washingtonpost.com/blogs/post-politics/wp/2013/06/18/nsa-head-surveillance-helped-thwart-more-than-50-terror-attempts/ Washington Post, 7/1/13 Intelligence officials said Tuesday that the government’s sweeping surveillance efforts have helped thwart “potential terrorist events” more than 50 times since the Sept. 11, 2001 attacks, and the officials detailed two new examples to illustrate the utility of the programs. In testimony before the House Intelligence Committee on Tuesday, officials cited a nascent plot to blow up the New York Stock Exchange and a case involving an individual providing financial support to an overseas terrorist group. “In recent years, these programs, together with other intelligence, have protected the U.S. and our allies from terrorist threats across the globe to include helping prevent the terrorist — the potential terrorist events over 50 times since 9/11,” National Security Agency Director Gen. Keith Alexander told the committee. He said at least 10 of the plots targeted the United States. FBI Deputy Director Sean Joyce said Tuesday that a provision in the Foreign Intelligence Surveillance Act helped officials monitor a “known extremist in Yemen” who was in contact with an individual in the United States. The information led to disruption of the New York Stock Exchange plot, Joyce said. Joyce also said that the use of a FISA business record provision helped officials with an investigation involving an individual who was communicating with an overseas terrorist. “The NSA, using the business record FISA, tipped us off that this individual had indirect contacts with a known terrorist overseas,” said Joyce. “We were able to reopen this investigation, identify additional individuals through a legal process and were able to disrupt this terrorist activity.” “So that’s four cases total that we have put out publicly,” Alexander said Tuesday. The Washington Post and Britain’s Guardian newspaper recently revealed the sweeping Internet and telephone surveillance techniques the NSA has utilized in recent years. Several of the witnesses testifying Tuesday said the disclosure of the surveillance programs by admitted leaker Edward Snowden had made the world a more dangerous place. “We are now faced with a situation that because this information has been made public, we run the risk of losing these collection capabilities,” said Robert S. Litt, general counsel of the Office of the Director of National Intelligence. “We’re not going to know for many months whether these leaks in fact have caused us to lose these capabilities, but if they do have that effect, there is no doubt that they will cause our national security to be affected.” Alexander had previously said the intelligence gathering helped in the cases of Najibullah Zazi, an Afghan American who pleaded guilty to planning suicide attacks in New York, and Pakistani American David Headley, who conducted surveillance in support of the 2008 attacks in Mumbai, India. Joyce elaborated on the two previously revealed cases on Tuesday. Alexander said he would provide details of the 50 examples he cited Tuesday to lawmakers in a classified setting on Wednesday. “Those 50 cases right now have been looked at by the FBI, CIA and other partners within the community, and the National Counterterrorism Center is validating all the points so that you know that what we’ve put in there is exactly right,” said Alexander. Alexander also said that if the surveillance programs had been in place before the Sept. 11 attacks, the United States would have known that hijacker Khalid Muhammad Abdallah al-Mihdhar was in San Diego and communicating with a known al Qaeda safehouse in Yemen. Alexander’s testimony came a day after President Obama defended his administration’s right to engage in such surveillance in an interview with PBS host Charlie Rose, saying the programs had adequate checks and balances. The Foreign Intelligence Surveillance Court, Obama argued, provided sufficient oversight of the National Security Agency’s activities and said the government was “making the right trade-offs” in balancing privacy rights with national security prerogatives. “What I can say unequivocally is that if you are a U.S. person, the NSA cannot listen to your telephone calls, and the NSA cannot target your e-mails,” he added, before Rose interjected, “And have not.” “And have not,” Obama reiterated. “They cannot and have not, by law and by rule, and unless they — and usually it wouldn’t be ‘they,’ it’d be the FBI — go to a court, and obtain a warrant, and seek probable cause, the same way it’s always been, the same way when we were growing up and we were watching movies, you want to go set up a wiretap, you got to go to a judge, show probable cause.” During the interview — which aired Monday night — the president took pains to distinguish his national security approach from those of former president George W. Bush and former vice president Richard B. Cheney. “The whole point of my concern, before I was president — because some people say, ‘Well, you know, Obama was this raving liberal before. Now he’s, you know, Dick Cheney.’ Dick Cheney sometimes says, ‘Yeah, you know? He took it all lock, stock and barrel,’ ” GMU Patriot Debate Institute 2013 21 File Title Obama said, according to a transcript provided by PBS. “My concern has always been not that we shouldn’t do intelligence gathering to prevent terrorism, but rather are we setting up a system of checks and balances?” GMU Patriot Debate Institute 2013 22 File Title Wiretapping Good – Terrorism Wiretapping stops terrorism---2008 attacks prove Katersky Et Al 13 Aaron Katersky, James Meek, Josh Margolin, Brian Ross, Writers at ABC news, “Al Qaeda’s Abandoned NY Stock Exchange Plot Revealed,” 7/1/2013, http://abcnews.go.com/Blotter/al-qaedas-abandoned-ny-stock-exchange-plotrevealed/story?id=19431509#.UdH0cfm1Frs ABC News, 7/1/13, AS Top U.S. security officials revealed today that the government's recently exposed surveillance programs led them to an al Qaeda cell that plotted, scouted, but ultimately abandoned a plan to bomb the Wall Street in 2008. "We found through electronic surveillance that they were actually in the initial stages of plotting to bomb the New York Stock Exchange," FBI Assistant Director Sean Joyce told the House Permanent Select Committee on Intelligence. 9/11 Terror Threat: Staying Safe Watch Video Joyce was testifying alongside high-level U.S. officials, including National Security Agency head Gen. Keith Alexander, before the House Intelligence Committee to defend the NSA's practice of collecting vast amounts of telephone and internet usage data – programs revealed last week by former NSA contractor Edward Snowden. Snowden, who is in hiding in Hong Kong after confessing to the leaks, called the reach of the programs "horrifying." The U.S. officials who testified today claimed they helped put a stop to more than 50 terror plots in 20 countries – four of which were discussed publicly. The NYSE plot, which had until today been unknown to the public, was centered around an auto parts dealer in Kansas City, Missouri, named Khalid Ouazzani, who pleaded guilty in 2010 for his role in a conspiracy to provide funding to al-Qaeda. At the time of his plea, the complex case against Ouazzani seemed to have little to do with the famous NYSE headquarters on Wall Street in Lower Manhattan, except for a vague reference in his plea agreement that said, "Over a period of years, [Ouazzani] and others discussed various ways they could support al Qaeda." The FBI now says Ouazzani was talking to an extremist in Yemen about a terror plot that would strike at the symbolic heart of America's capitalist system – an attack on Wall Street. Ouazzani was never charged with planning any attacks, and a federal law enforcement official told ABC News it was Ouazzani's role as a cooperating witness, after he was identified with the help of NSA programs, that helped authorities uncover the plot in the first place. A senior law enforcement official told ABC News that "overseas intel" connected Ouazzani to two U.S. citizen extremists, Sabirhan Hasanoff and Wesam el-Hanafi. Court documents unsealed today showed that all three swore their allegiance to al Qaeda, but it was Hasanoff who traveled to New York in 2008 to conduct a scouting mission for a possible bombing attack on the stock exchange. Hasanoff wrote a "rudimentary report" to a "senior terrorist leader" in an email about the security situation there, the court documents say. However, the leader decided that while the information "could be used by someone who wanted to do an operation, he was not satisfied with the report, and he accordingly disposed of it." Ouazzani's crew and the plot, never "went operational," a counter-terrorism official in New York said. Hasanoff and el-Hanafi, both later pleaded guilty to terrorism-related charges in June 2012, but again the Department of Justice omitted any mention of the stock exchange in their announcement at the time. The plot was left out of the public record apparently because it was discovered in part from intelligence gathered through surveillance authorized by the Foreign Intelligence Surveillance Court (FISA) in Washington, DC. Though there are ways to use such evidence at trial, the Justice Department tries to instead attempt to secure convictions on more typical varieties of crimes like fraud and money-laundering. That was the path chosen in case of the NYSE bomb plot that never was. The stock exchange, at 11 Wall Street, is just a half-mile away from the site of the World Trade Center towers that were destroyed during the Sept. 11, 2001 terror attacks by al Qaeda. Nicknamed the "Big Board," the exchange is the world's largest stock market with the total value of the companies it lists hovering at more than $16.6 trillion. GMU Patriot Debate Institute 2013 23 File Title Though an attack on the building would be a colossal symbolic blow to the country, the market itself would remain largely intact because the vast majority of trading is now done online, and the market's computer network was relocated to off-site locations in the wake of the 2001 attacks. GMU Patriot Debate Institute 2013 24 File Title Wiretapping Good – Terrorism Wiretapping stops terrorism Hosenball 13 Mark Hosenball, Writer at Reuters, “U.S. Internet spying foiled plot to attack NY subways – sources,” Jun 8 2013, Reuter http://in.reuters.com/article/2013/06/07/usa-internet-subway-plot-idINDEE9560EW20130607, 7/1/13 AS A secret U.S. intelligence program to collect emails that is at the heart of an uproar over government surveillance helped foil an Islamist militant plot to bomb the New York City subway system in 2009, U.S. government sources said on Friday. Savage 13 Charlie Savage, Writer at New York Times, “F.B.I. Director Warns Against Dismantling Surveillance Program,” June 19 2013, http://www.nytimes.com/2013/06/20/us/politics/fbi-director-warns-against-dismantling-surveillance-program.html?_r=0 New York Times, 7/1/13 AS “In this particular area, where you’re trying to prevent terrorist attacks, what you want is that information as to whether or not that number in Yemen is in contact with somebody in the United States almost instantaneously so you can prevent that attack,” he said. “You cannot wait three months, six months, a year to get that information, be able to collate it and put it together. Those are the concerns I have about an alternative way of handling this.” GMU Patriot Debate Institute 2013 25 File Title Wiretapping Good – Legal Wiretapping is legal Barone 13 Michael Barone, a political analyst and journalist, studies politics, American government, campaigns and elections, and a senior political analyst for the Washington Examiner. “NSA surveillance, if ungentlemanly, is not illegal,” June 11, 2013, AEI, http://www.aei.org/article/foreign-and-defense-policy/defense/intelligence/nsa-surveillance-if-ungentlemanly-is-not-illegal/, DOA: 7-1-13, y2k "Gentlemen do not read each other's mail." That's what Secretary of State Henry Stimson said to explain why he shut down the government's cryptanalysis operations in 1929. Edward Snowden, who leaked National Security Agency surveillance projects to Britain's Guardian, evidently feels the same way. "I can't in good conscience allow the U.S. government," he explained, less succinctly than Stimson, "to destroy privacy, Internet freedom and basic liberties for people around the world with this massive surveillance machine they're secretly building." Some questions about this episode remain. How did a 29-year-old high school dropout get a $122,000 job with an NSA contractor? How did his job give him access to material including, he says, Foreign Intelligence Surveillance Agency Court documents? And why did he flee to China's Special Autonomous Region of Hong Kong and make his revelations just before the Sunnylands summit, where Barack Obama was preparing to complain to Xi Jinping about China's cyberwarfare attacks? Oh, and now that he has checked out of his Hong Kong hotel, where has he gone? All tantalizing questions. But some other questions that many are asking have clear answers. Is the NSA surveillance of telephone records illegal? No, it has been authorized by the FISA Court under the FISA Act provisions passed by (a Democratic) Congress in 2008. The NSA is not entitled to listen to the contents of specific phone calls. It has to go back to the FISA Court for permission to do that. Under the Supreme Court's 1979 Smith v. Maryland decision, the government can collect evidence of phone numbers called, just as the government can read the addresses on the outside of an envelope. Snowden presented no evidence that the NSA is abusing its powers by accessing the private information of those with obnoxious opinions. There is, so far anyway, no evidence of the kind of political targeting committed by the Internal Revenue Service. Instead, the NSA is looking for patterns of unusual behavior that might indicate calls to and from terrorists. This data mining relies on the use of algorithms sifting through Big Data, much like the data mining of Google and the Obama campaign. Snowden also exposed the NSA's Prism program, which does surveil the contents of messages -- but only those of suspected terrorists in foreign countries. During George W. Bush's administration, many journalists and Democrats assailed this as "domestic wiretapping." But the only time people here are surveilled is when they are in contact with terrorism suspects in foreign countries. The right of the government to invade people's privacy outside the United States is, or should not be, in question. You might think, as Henry Stimson did in 1929, that it's ungentlemanly. But as secretary of war between 1940 and 1946, Stimson was grateful for the code-breaking programs that enabled the United States and Britain to decrypt secret Japanese and German messages. That code breaking, as historians have recounted, though not until long after the war, undoubtedly saved the lives of tens of thousands of Allied service members. GMU Patriot Debate Institute 2013 26 File Title "The Constitution and U.S. laws," as former Attorney General Michael Mukasey wrote in the Wall Street Journal, "are not a treaty with the universe; they protect U.S. citizens." It is an interesting development that Barack Obama has continued and, Snowden asserts, strengthened programs at least some of which he denounced as a U.S. senator and presidential candidate. As George W. Bush expected, Obama's views were evidently changed by the harrowing contents of the intelligence reports he receives each morning. There are people out there determined to harm us, and not just because they can't bear Bush's Texas drawl. The Pew Research/Washington Post poll conducted from June 7 to 9 found that by a 56 to 41 percent margin, Americans found it "acceptable" that the "NSA has been getting secret court orders to track calls of millions of Americans to investigate terrorism." That's similar to the margin in a 2006 Pew poll on the NSA "secretly listening in on phone calls and reading emails without court approval." Those numbers are in line with changes in opinion over the last two decades. With increased computer use, technology is seen as empowering individuals rather than Big Brother. And with an increased threat of terrorist attack, government surveillance is seen as protecting individuals. In these circumstances, most Americans seem willing to accept NSA surveillance programs that, if ungentlemanly, are not illegal. GMU Patriot Debate Institute 2013 27 File Title Wiretapping Good – Legal Wiretapping is legal Leahy, United States Senator, 06 (Patrick, “Is the Domestic Surveillance Program Legal?” 06-30-14, EBSCO, bdg) The question for this hearing is the illegality of the government's domestic spying on ordinary Americans without a warrant. The question facing us is not whether the government should have all the tools it needs to protect the American people. Of course it should. The terrorist threat to America's security remains very real, and it is vital that we be armed with the tools needed to protect Americans' security. That is why I coauthored the USA PATRIOT Act five years ago and why it passed with such broad, bipartisan support. That is why we have amended the Foreign Intelligence Surveillance Act [FISA] five times since 9/11 to provide more flexibility. We all agree that we should be wiretapping al Qaeda terrorists. Congress has given the President authority to monitor these messages legally, with checks to guard against abuses when Americans' conversations and email are being monitored. But instead, the President has chosen to do it illegally, without those safeguards. GMU Patriot Debate Institute 2013 28 File Title Wiretapping Good – Legal Wiretapping is legal House of Representatives, “Constitutional limitations on domestic surveillance,” June 7, 2007, http://www.gpo.gov/fdsys/pkg/CHRG-110hhrg35861/pdf/CHRG-110hhrg35861.pdf, 7/2/2013 AS “The Honorable Trent Franks: Mr. Chairman, in 1968 when Congress enacted the first Federal wiretapping statute, it included in the legislation an explicit statement that, ‘‘nothing in this chapter shall limit the constitutional power of the President to take such measures as he deems necessary to protect the Nation against actual or potential attack, or to obtain foreign intelligence information deemed necessary to the security of the United States.’’ Justice Holmes wrote for a unanimous Supreme Court in 1909 that, ‘‘when it comes to a decision by the head of the state upon a matter involving its life, public danger warrants a substitution of executive process for judicial process.’’ GMU Patriot Debate Institute 2013 29 File Title Wiretapping Good – Crime Wire-tapping is key to effective FBI operations---key to rooting out crimes National Journal 11 “Group Urges Scrutiny To Calls To Expand CALEA,” 2-5-11, http://www.nationaljournal.com/blogs/techdailydose/2011/02/group-urges-scrutiny-to-calls-to-expand-calea-15?mrefid=site_search, DOA: 7-1-13, DS A coalition of tech associations and privacy groups Tuesday released a "statement of concern" about the FBI's proposals to expand a current law requiring communications providers to ensure law enforcement can conduct wiretaps on their networks. The statement was released by a dozen groups including the Business Software Alliance, Center for Democracy and Technology, Computer and Communications Industry Association, the Net Coalition, and TechAmerica, and comes two days before a House Judiciary subcommittee hearing Thursday on ensuring lawful government surveillance with the rise of new technologies. "Lawful electronic surveillance plays an important role in enabling government agencies to fulfill their obligations to stop crime and to protect national security," according to the statement from the groups. "These goals, however, must be reconciled with other important societal values, including cybersecurity, privacy, free speech, innovation and commerce." The statement calls on the FBI and the Obama administration to answer several questions before lawmakers consider any proposals to expand the law known as the Communications Assistance for Law Enforcement Act, which requires telecom providers to design wiretapping capabilities into their networks. These questions include explaining what problems would expanding CALEA address, have alternatives to a new CALEA-like mandate been considered sufficiently, and have narrower approaches been pursued. Once these questions are answered, the groups say any effort to expand CALEA must address several issues including preserving the trust of communication users, safeguarding cybersecurity, protecting innovation, continuing to allow the use of strong encryption without introducing new vulnerabilities, avoiding unfunded mandates, and anticipating international demands that may result from expanding U.S. surveillance laws. GMU Patriot Debate Institute 2013 30 File Title Wiretapping Good – Organized Crime Impact Organized Crime is bad Dijk 07 Jan Van Dijk, Pieter van Vollenhoven Chair in Victimology, Human Security and Safety, University of Tilburg, Tilburg, The Netherlands, “Mafia markers: assessing organized crime and its impact upon societies,” 9 October 2007, http://link.springer.com/article/10.1007/s12117-007-9013-x/fulltext.html, 7/2/13 AS In our view, the most important negative effect of organized crime, offsetting all possible benefits, is its pernicious impact on governance. Organized crime tends to erode the integrity of those holding a public office, including those responsible for upholding the rule of law. Where organized crime groups are powerful, legislation, policy-making and legal rulings no longer serve the general interest but the interests of the few. Through the pervasive bias of legislation, policy decisions and jurisprudence, market efficiencies are undermined and both local and foreign investors lose confidence in the legal and regulatory functions of the state and consequently stay away. GMU Patriot Debate Institute 2013 31 File Title Wiretapping Good – A2: Privacy Impact of wiretapping and surveillance policies on privacy is limited Taylor, 2013, Stuart Taylor Jr. is an American journalist. He graduated from Princeton University and Harvard Law School, and is a regular columnist for The National Journal, a Contributing Editor at Newsweek, and a Nonresident Senior Fellow in Governance Studies at the Brookings Institution. He comments on legal affairs and often focuses on the Supreme Court, appearing frequently in other publications such as The Atlantic, Slate, The New Republic, and The Wall Street Journal. LEGAL “AFFAIRS - Wiretaps Are an Overblown Threat to Privacy”, May 30 2013, National Journal, http://www.nationaljournal.com/magazine/legal-affairs-wiretaps-are-anoverblown-threat-to-privacy-20011006 7/1/2013, DS The telescreen received and transmitted simultaneously. Any sound that Winston made, above the level of a very low whisper, would be picked up by it; moreover, ... he could be seen as well as heard. How often, or on what system, the Thought Police plugged in on any individual wire was guesswork. It was even conceivable that they watched everybody all the time.-George Orwell, 1984 Ever since we first read those chilling words, many of us have felt a reflexive horror of being bugged, wiretapped, or (now) tracked by the FBI's fearsomely named Carnivore program, which sifts through computer networks for evidence of crime. And who can forget the wiretaps and buggings that fueled "the savage campaign of defamation waged by J. Edgar Hoover as head of the FBI against Dr. Martin Luther King," in the words of Rep. Barney Frank, D-Mass.? (Some have forgotten that it was Robert F. Kennedy who authorized the taps.) Presidents Roosevelt, Truman, Johnson, and Nixon also used wiretaps for political ends. So when the government seeks broader electronic surveillance powers, as Attorney General John D. Ashcroft is doing now, a lot of us instinctively worry about unleashing some kind of Big-Brother-Hoover-Nixon monster to spy on people and then blackmail or smear them. Now is a good time to ask whether this fear is exaggerated. The case for more surveillance is pretty obvious: We need to use every available tool to prevent the mass murders of thousands or even millions of Americans. The case against is the familiar concern that the government could abuse the new powers to destroy or damage our privacy. To strike the best balance, we must scrutinize that risk with some skepticism. What bad things could happen, and how likely are they? Abuses are always possible, especially in wartime, when the temptations for overzealousness are at their zenith and the internal safeguards are at their weakest. "This isn't going to be limited to suspected bombers," as UCLA law professor Eugene Volokh wrote recently in Slate. "Already the government is (wisely) considering trying to track those who financially assist terrorists; financial institutions will find their records (which may include your and my records) being investigated. There will be a peace movement, and there might be reason to suspect that our enemies will try to influence it; members of the movement might find themselves being investigated." So this is not to suggest that Congress should give the government carte blanche-or, indeed, should give it any new surveillance powers at all unless they might help fight terrorism. While the details of Ashcroft's proposals are complex, the fundamental question is whether the government should have a relatively free hand to spy on suspected terrorists and their associates-including people suspected of ordinary crimes or immigration violations whose possible links to terrorism may largely be a matter of hunch and speculation-without producing the specific evidence required in ordinary criminal investigations. What dangers would such new powers present? Well, officials might be tempted to stray from their core counter-terrorism mission by going after (say) suspected drug dealers who might possibly be linked to the Medellin cartel, which has engaged in terrorism outside the United States. Officials might spy on anti-globalization demonstrators or peace protesters who throw rocks through the windows of government buildings. And they might already be using their current foreign intelligence surveillance powers to fish for evidence of terrorism by tapping or bugging leaders of Islamic and Arab groups in the United States, whose religious and political discussions are sometimes seeded with hot anti-American rhetoric. Many and probably most of the conversations overheard and e-mails intercepted would be innocent. That's inevitable when you throw a broad net in the hope of catching people who are very hard to find. And the tappers and buggers might well overhear intimacies or embarrassing disclosures that are none of the government's business. But any officials tempted to abuse such information would be running very serious risks of removal from office, disgrace, and even criminal prosecution. GMU Patriot Debate Institute 2013 32 File Title A major reason for the electronic abuses during the bad old days of J. Edgar Hoover was that until 1967, the Supreme Court had held that the Constitution imposed no limit on governmental wiretapping of anyone, for any reason. Nor were there serious penalties to deter Hoover from using his dirt to play politics. Now it is a federal crime for the FBI director or anyone else to leak information gleaned from wiretaps or bugs for political ends or for other improper purposes. And now the Justice Department, FBI, and other agencies involved in surveillance are themselves scrutinized by internal and external watchdog agencies with mandates to blow the whistle on any abuses. Washington lawyer Stewart Baker, former general counsel of the National Security Agency, wrote in an online dialogue with Volokh in Slate: "As I once said to an outsider skeptical of NSA's commitment to the law, `Why am I sure that the agency isn't breaking the law? Because there are five outside offices with authority to audit our conduct, and those agencies are headed by five ambitious people whose careers would be made if they could uncover violations of law at NSA.' " And now our governmental, media, and academic elites are replete with one-time antiwar protesters and others who are quick to pounce on any sign that the FBI or other agencies are up to no good. "Defending civil liberties is at the heart of the Baby-Boomer self-image, a self-image that's been packaged and sold to adolescents ever since," as Baker wrote. "However powerful and rich and snobbish we exteenagers become, we still see ourselves as rebels fighting a lonely battle against overweening authority. To make that myth work, we need an overweening authority to battle, preferably one that can't fight back. Intelligence agencies are perfect for that role." So we have watchdogs galore. Have any grave or widespread invasions of privacy in the past 25 years stemmed from surveillance of suspected terrorists-or of anybody, for that matter? Not that I've noticed. I do know of one troublesome case of suspected political abuse of information gleaned from a foreign intelligence wiretap in the 1980s. Perhaps I've missed others. But I'd wager that for every such case, there have been dozens and dozens of other cases of people who have seen their privacy or reputations unfairly shredded by or in media stories unrelated to governmental surveillance. "I'd worry more about The New York Times going through my trash than about the police doing it," observes Yale law professor Kate Stith, a criminal law expert. Of course, the notion that FBI agents may be listening in on our conversations gives us the creeps, even if listening is all they do. "You had to live," Orwell wrote in 1984, "in the assumption that every sound you made was overheard, and, except in darkness, every movement scrutinized." But the government has only a limited number of agents to spend their time listening to wiretaps. Agency heads have little incentive to waste their time and budgets on unwarranted snooping. And they will have to justify any and all taps and bugs to their superiors, to subordinates who might blow the whistle, and to judges. So the chance that they will tap or bug or Carnivore you or me or even the Arab-American family down the street will remain quite small. Indeed, the chance that they will spy on you is a great deal smaller than the chance that your employer is monitoring your e-mail and your Web surfing. It is probably smaller than the chance that a computer hacker will get into your e-mail or a neighborhood kid will overhear your cell phone conversation. "Is privacy about government security agents decrypting your e-mail and then kicking down the front door with their jackboots?" James Gleick wrote in The New York Times Sunday Magazine five years ago. "Or is it about telemarketers interrupting your supper with cold calls? It depends. Mainly, of course, it depends on whether you live in a totalitarian or a free society." We live in a free one. Eighteen years ago, in The Rise of the Computer State, the respected journalist David Burnham wrote: "The question looms before us: Can the United States continue to flourish and grow in an age when the physical movements, individual purchases, conversations and meetings of every citizen are constantly under surveillance by private companies and government agencies?" It can. It has. And now that the computer state has risen indeed, the threat of being watched by Big Brother or smeared by the FBI seems a lot smaller than the threat of being blown to bits or poisoned by terrorists. GMU Patriot Debate Institute 2013 33 File Title Wiretapping Good – A2: Credibility University of South Florida 13 “Obama response to NSA scandal inadequate, alarming” June 10, 2013, usforacle.com, http://www.usforacle.com/obama-response-to-nsa-scandal-inadequate-alarming-1.2829308#.UdH3oDuxWSo, July 1, 2013, NS “Nobody is listening to your telephone calls,” the president ensured. What the NSA says it is doing, however, is collecting metadata — information ranging from call locations, durations and telephone numbers — a diminutive term that is likely being used for public relations purposes to avoid public suspicion. “You cannot have 100 percent security and 100 percent privacy,” he said. GMU Patriot Debate Institute 34 File Title 2013 *** Con GMU Patriot Debate Institute 2013 35 File Title Wiretapping Bad – A2: Terrorism Domestic spying program aids terrorist groups Rood 8 Justin Rood is ABC Staff Reporter, “Domestic Spying Program Could Aid Terrorists, Experts Say,” Feb. 1, 2008, ABC News, http://abcnews.go.com/Blotter/story?id=4224513&page=1#.UdGtFPmTiSo, DOA: 7-1-13, y2k Although the Bush administration calls it a vital weapon against terrorism, its domestic wiretapping effort could become a devastating tool for terrorists if hacked or penetrated from inside, according to a new article by a group of America's top computer security experts. The administration has said little about the program except to defend it against charges it amounts to illegal spying on U.S. citizens. When news of the program broke in 2006, then-White House spokesman Scott McClellan called the program a "limited" effort "targeted at al Qaeda communications coming into or going out of the United States." But documents submitted in an ongoing court case indicate the program involves data centers at major telecommunications hubs that siphon off and analyze billions of bytes of Americans' emails, phone calls and other data. By diverting the flow of so much domestic data into a few massive pools, the administration may have "[built] for its opponents something that would be too expensive for them to build for themselves," say the authors: "a system that lets them see the U.S.'s intelligence interests...[and] that might be turned" to exploit conversations and information useful for plotting an attack on the United States. The Office of the Director of National Intelligence referred a request for comment on the article to the interagency National Counterterrorism Center, which directed calls to the National Security Agency, which reportedly runs the program. The NSA declined to comment for this story.The White House referred calls to the NSA. Senate on the verge of passing a sweeping law authorizing the wiretapping program and updating the law that governs international surveillance. The article, slated to appear in an upcoming issue of the journal IEEE Security & Privacy, was written by six experts from Sun Microsystems, Columbia University, Princeton University, the University of Pennsylvania and California-based research giant SRI International. The data centers for the classified program are reportedly housed in "secure" rooms within telecommunications hubs around the country, and connect to operations buried within the NSA's highly classified facilities. But judging by past breaches, the authors conclude this system could be compromised also – from within or outside. In 2004, hackers cracked a wiretapping function on a Greek national cell phone network. For 10 months, they intercepted conversations by the country's prime minister and its ministers of defense, foreign affairs and justice, and roughly 100 other officials and parliament members, the authors note. The hackers were never caught. "Although the NSA has extensive experience in building surveillance systems, that does not mean things cannot go wrong," the authors state. "When you build a system to spy on yourself, you entail an awesome risk." Just as dangerous is the possibility that an insider could access the system undetected, according to the experts. Poorly-designed surveillance technology used by the FBI relies on a "primitive" system to track people who use the operation to wiretap phone conversations, the authors say, creating what they call a "real risk" of an insider attack. They note that convicted spy Robert Hanssen, one of the most destructive moles in the bureau's history, exploited similar weaknesses to steal information and follow the investigation into himself on FBI computers without leaving a trail. Last August, a federal judge ruled the program was unconstitutional. The administration is appealing the decision. The Senate is currently considering a White House-backed effort to retroactively immunize telecommunications companies which have participated in the program from civil suits, several of which have been filed since the program came to light. The legislation, the authors say, would allow the program to continue without ensuring proper oversight, accountability and security, creating "a long-term risk." GMU Patriot Debate Institute 2013 36 File Title Wiretapping Bad – Digital Infrastructure Wiretapping undermines digital infrastructure and national security JAYCOX & SCHOEN 13, MARK M. JAYCOX AND SETH SCHOEN a civil liberties organization focusing on people's rights as they relate to technology “The Government Wants A Backdoor Into Your Online Communications” MAY-22-2013 https://www.eff.org/deeplinks/2013/05/caleatwo DOA 7-1-13 In an age where the government claims to want to beef up Internet security, any backdoors into our communications makes our infrastructure weaker . Backdoors also take away developers' right to innovate and users' right to protect their privacy and First Amendment-protected anonymity of speech with the technologies of their choice. The FBI's dream of an Internet where it can listen to anything, even with a court order, is wrong and inconsistent with our values. National security jeopardized Wiretapping backdoors even affect national security. In 2012, Wired revealed the NSA's discovery and concern that every telephone switch for sale to the Department of Defense had security vulnerabilities due to the legally-mandated wiretap implementation. If politicians are serious about online security, they will not make these security blunders even worse by bringing more sensitive communication technologies under CALEA's scope. GMU Patriot Debate Institute 2013 37 File Title Wiretapping Bad – Credibility Zhendong, qualifications, 2013 (Pu, “Spy scandal ‘will weaken’ US global credibility,” accessed: 6-30-14, ASH) Incident may lead to new international rules on surveillance Anger over Washington's extensive eavesdropping on world leaders and ordinary citizens has shown no signs of abating, as observers say using anti-terrorism as an excuse for pervasive surveillance is "hypocritical and abused". Chinese experts said the disclosure shows the United States is making the most of its intelligence capabilities to secure its supremacy in the world, and the scandal will weaken its global credibility. Observers also said the scandal may prompt new international rules to rein in transnational spying as 21 countries have reportedly asked for a UN draft resolution against the US surveillance. The latest reports reveal the US was responsible for broad surveillance of the communications of as many as 35 world leaders and likely millions of foreign nationals. The leaders monitored through the National Security Agency phone tapping included German Chancellor Angela Merkel, who was reported to have been spied on by the US since 2002. The NSA was also accused of accessing tens of thousands of French phone records as well as tracking 60.5 million telephone calls in Spain in a single month. Qu Xing, president of the China Institute of International Studies, said Washington has been highly concerned by European integration, as Europe would surpass the US to become a new power center if the EU worked as successfully as expected. But Qu said US-EU relations will forge ahead in the long term despite the recent setback. "The US and Europe are like a pair of business partners. Both benefit from a cooperative relationship and neither can put up with the consequences of a breakup," Qu said. Shi Yinhong, a senior expert on US studies at Renmin University of China, said, "Perceiving itself as a superpower, the US holds the arrogant attitude that it is not a big deal to steal other countries' information". In another development, Japanese media revealed over the weekend that the NSA approached the Japanese government in 2011 to allow it to tap the international fiber-optic cables that traverse the country and carry much of the traffic across East Asia, in an attempt to gather more information on China. Calling cybersecurity "a matter of sovereignty", Foreign Ministry spokeswoman Hua Chunying urged the international community on Tuesday to set up a new security concept of mutual trust, benefit and equality, and to create binding regulations within the UN framework. "China and Russia have submitted a draft plan, in an effort to help the world jointly tackle the problem," Hua said. Experts said Washington not only offends its allies by the extensive monitoring, but also harms mutual trust. Dong Manyuan, deputy director of the China Institute of International Studies, said Washington can hardly find any excuse for its wiretapping. "Originally, the US claimed that it monitored billions of calls worldwide to fight terrorism. However, the reality shows that Washington has expanded its monitoring to Merkel and other European leaders, who share the same values as (US President Barack) Obama," Dong said. Washington recently denied that Obama was informed of the operation against Merkel in 2010. "Obama did not halt the operation but rather let it continue," German newspaper Bild am Sonntag quoted a high-ranking NSA official as saying. A poll by a German magazine found that 60 percent of Germans believe the scandal has damaged ties. The White House on Monday acknowledged that more constraints are needed regarding the NSA's surveillance practices to ensure that privacy rights are protected. "We need to make sure that we're collecting intelligence in a way that advances our security needs and that we don't just do it because we can," White House spokesman Jay Carney said. The spying row prompted European leaders last week to demand a new deal with Washington on intelligence gathering that would maintain an essential alliance while keeping the fight against terrorism on track. Swiss President Ueli Maurer warned the revelations risked "undermining confidence between states". "We don't know if we're only seeing the tip of the iceberg or if other governments are acting in the same ruthless manner," he told reporters. Analysts said the exposure of the US surveillance and the subsequent global anger may lead to the birth of a binding international agreement on spying through telecommunications and cyberspace. Shi said the series of eavesdropping operations may accelerate the formulation of rules in the global community, but it will be extremely difficult. "In fact, international rules can only help in a limited way. What we can do is protect ourselves technically," Shi said. GMU Patriot Debate Institute 2013 38 File Title During the weekend, Germany and Brazil drafted a UN General Assembly resolution that condemns "indiscriminate" and "extraterritorial" surveillance, and ensures "independent oversight" of electronic monitoring. The draft has enlisted 19 other countries including US allies Mexico and France. Brazilian President Dilma Rousseff canceled a trip to the US last month over allegations the NSA intercepted her office's communications. Guo Xiangang, vice-president of the China Institute of International Studies, said Washington will restrain its "current unbridled behavior" if a UN resolution comes into force, but it will never give up surveillance of other countries, including its allies. "Despite a rift with allies, the US will further integrate its intelligence power to continue actions that fit its national interest," Guo said. GMU Patriot Debate Institute 2013 39 File Title Wiretapping Bad – Credibility The associated press, 2013 (“NSA spying threatens to hurt US foreign policy,” accessed: 6/30/14,ASH) Secretary of State John Kerry landed in Rome and Paris to talk about Mideast peace, Syria and Iran but was confronted by outrage over the sweep and scope of U.S. spying abroad. President Barack Obama already has defended America's surveillance activities to leaders of Russia, Mexico, Brazil, France and Germany and was even questioned about it during his birthday appearance on late-night television. Obama and Kerry are trying to calm international anger over classified disclosures by former National Security Agency contractor Edward Snowden. Snowden's revelations about NSA tactics — that allegedly include tapping as many as 35 world leaders' cellphones — threaten to harm U.S. foreign policy in several areas. In Washington, demonstrators held up signs reading "Thank you, Edward Snowden!" as they marched near the U.S. Capitol to demand that Congress investigate the NSA's mass surveillance programs. "The magnitude of the eavesdropping is what shocked us," former French Foreign Minister Bernard Kouchner said in a radio interview. "Let's be honest, we eavesdrop too. Everyone is listening to everyone else. But we don't have the same means as the United States, which makes us jealous." The British ambassador to Lebanon, Tom Fletcher, tweeted this week: "I work on assumption that 6+ countries tap my phone. Increasingly rare that diplomats say anything sensitive on calls." Diplomatic relations are built on trust. If America's credibility is in question, the U.S. will find it harder to maintain alliances, influence world opinion and seal trade deals. Spying among allies is not new. Madeleine Albright, secretary of state during the Clinton administration, recalled being at the United Nations and having the French ambassador ask her why she said something in a private conversation that the French had apparently intercepted. The French government protested revelations this week that the NSA had collected 70.3 million French-based telephone and electronic message records in a 30-day period. Albright said Snowden's disclosures have been very damaging to U.S. policymakers. "I think it has made life very difficult for Secretary Kerry," Albright said at a conference hosted by the Center for American Progress in Washington. The disclosures could give the Europeans leverage in talks with the U.S. on a free trade agreement, which would bring together nearly half of the global economy. "If we go to the negotiations and we have the feeling those people with whom we negotiate know everything that we want to deal with in advance, how can we trust each other?" Martin Schulz, president of the European Parliament, asked. To Henry Farrell and Martha Finnemore at George Washington University, damage from the NSA disclosures could "undermine Washington's ability to act hypocritically and get away with it." Writing in the magazine Foreign Affairs, they claim the disclosures forced Washington to abandon its "naming-and-shaming campaign against Chinese hacking." The revelations could undercut Washington's effort to fight terrorism, says Kiron Skinner, director of the Center for International Relations and Politics at Carnegie Mellon University. The sweeping nature of NSA surveillance goes against the Obama administration's claim that much of U.S. espionage is carried out to combat terrorism, she says. "Allied leaders will have no incentive to put their own militaries at risk if they cannot trust U.S. leadership," Skinner said. The Obama administration's response to the outrage has been that the U.S. is gathering foreign intelligence of the type gathered by all nations and that it's necessary to protect the U.S. and its allies against security threats. Most governments have not retaliated, but some countries are pushing back. Germany and France are demanding that the Obama administration agree by year's end to new rules that could mean an end to reported American eavesdropping on foreign leaders, companies and innocent citizens. Brazilian President Dilma Rousseff canceled her official state visit to the White House. And Brazil says it is working with other countries to draft a United Nations General Assembly resolution that would guarantee people's privacy in electronic communications. A European Parliament committee in Brussels approved sweeping data protection rules that would strengthen online privacy and outlaw the kind of data transfers the U.S. is using for its spying program. European lawmakers have called for the suspension of an agreement that grants U.S. authorities access to bank data needed for terrorrelated investigations. "We need trust among allies and partners," said German Chancellor Angela Merkel, whose cellphone was allegedly tapped by the NSA. "Such trust now has to be built anew." GMU Patriot Debate Institute 2013 40 File Title Wiretapping Bad – Credibility Riechmann, qualifications, 2013 (Deb, “NSA spying threatens U.S. foreign policy efforts,” accessed: 6/30/14, ASH) WASHINGTON -- WASHINGTON (AP) — Secretary of State John Kerry went to Europe to talk about Mideast peace, Syria and Iran. What he got was an earful of outrage over U.S. snooping abroad. President Barack Obama has defended America's surveillance dragnet to leaders of Russia, Mexico, Brazil, France and Germany, but the international anger over the disclosures shows no signs of abating in the short run. Longer term, the revelations by former National Security Agency contractor Edward Snowden about NSA tactics that allegedly include tapping the cellphones of as many as 35 world leaders threaten to undermine U.S. foreign policy in a range of areas. This vacuum-cleaner approach to data collection has rattled allies. "The magnitude of the eavesdropping is what shocked us," former French Foreign Minister Bernard Kouchner said in a radio interview. "Let's be honest, we eavesdrop too. Everyone is listening to everyone else. But we don't have the same means as the United States, which makes us jealous." So where in the world isn't the NSA? That's one big question raised by the disclosures. Whether the tapping of allies is a step too far might be moot. The British ambassador to Lebanon, Tom Fletcher, tweeted this past week: "I work on assumption that 6+ countries tap my phone. Increasingly rare that diplomats say anything sensitive on calls." Diplomatic relations are built on trust. If America's credibility is in question, the U.S. will find it harder to maintain alliances, influence world opinion and maybe even close trade deals. Spying among allies is not new. Madeleine Albright, secretary of state during the Clinton administration, recalled being at the United Nations and having the French ambassador ask her why she said something in a private conversation apparently intercepted by the French. The French government protested revelations this past week that the NSA had collected 70.3 million French-based telephone and electronic message records in a 30-day period. Albright says Snowden's disclosures have hurt U.S. policymakers. "A lot of the things that have come out, I think are specifically damaging because they are negotiating positions and a variety of ways that we have to go about business," Albright said at a conference hosted by the Center for American Progress in Washington. "I think it has made life very difficult for Secretary Kerry. ... There has to be a set of private talks that, in fact, precede negotiations and I think it makes it very, very hard." The spy flap could give the Europeans leverage in talks with the U.S. on a free trade agreement, which would join together nearly half of the global economy. "If we go to the negotiations and we have the feeling those people with whom we negotiate know everything that we want to deal with in advance, how can we trust each other?" asked Martin Schulz, president of the European Parliament. Claude Moniquet, a former French counterintelligence officer and now director of Brussels-based European Strategic Intelligence and Security Center, said the controversy came at a good time for Europe "to have a lever, a means of pressure ... in these negotiations." To Henry Farrell and Martha Finnemore at George Washington University, damage from the NSA disclosures could "undermine Washington's ability to act hypocritically and get away with it." The danger in the disclosures "lies not in the new information that they reveal but in the documented confirmation they provide of what the United States is actually doing and why," they wrote in Foreign Affairs. "When these deeds turn out to clash with the government's public rhetoric, as they so often do, it becomes harder for U.S. allies to overlook Washington's covert behavior and easier for U.S. adversaries to justify their own." They claim the disclosures forced Washington to abandon its "naming-and-shaming campaign against Chinese hacking." The revelations could undercut Washington's effort to fight terrorism, says Kiron Skinner, director of the Center for International Relations and Politics at Carnegie Mellon University. The broad nature of NSA surveillance goes against the Obama administration's claim that much of U.S. espionage is carried out to combat terrorism, she said. "If Washington undermines its own leadership or that of its allies, the collective ability of the West to combat terrorism will be compromised," Skinner said. "Allied leaders will have no incentive to put their own militaries at risk if they cannot trust U.S. leadership." The administration asserts that the U.S. is amassing intelligence of the type gathered by all nations and that it's necessary to protect the U.S. and its allies against security threats. Kerry discussed the NSA affair in Europe with French and Italian officials this past week. Most governments have not retaliated, but some countries are pushing back. GMU Patriot Debate Institute 2013 41 File Title Germany and France are demanding that the administration agree by year's end to new rules that could mean an end to reported American eavesdropping on foreign leaders, companies and innocent citizens. Brazilian President Dilma Rousseff canceled her official state visit to the White House. She ordered measures aimed at greater Brazilian online independence and security after learning that the NSA intercepted her communications, hacked into the state-owned Petrobras oil company's network and spied on Brazilians. Brazil says it is working with other countries to draft a U.N. General Assembly resolution that would guarantee people's privacy in electronic communications. A European Parliament committee approved rules that would strengthen online privacy and outlaw the kind of data transfers the U.S. is using for its spying program. European lawmakers have called for the suspension of an agreement that grants U.S. authorities access to bank data needed for terrorismrelated investigations. "We need trust among allies and partners," said German Chancellor Angela Merkel, whose cellphone was allegedly tapped by the NSA. "Such trust now has to be built anew." GMU Patriot Debate Institute 2013 42 File Title Wiretapping Bad – Credibility Zawilzka-Florczuk and Frymark, qualifications and qualifications, 2014 (Marta and Kamil, “The NSA: the impact of the wiretapping scandal on German-American relations,” accessed: 6/30/14,ASH) Edward Snowden revealed that America’s National Security Agency (NSA) had tapped Chancellor Angela Merkel’s mobile phone and had collected date en masse. This has caused the largest crisis of confidence in relations between Germany and the US since the Iraq war. Due to the technological advantage which American intelligence services have, Germany wishes to continue close co-operation with the US but is making efforts to change the legal basis of this co-operation dating back to Cold War times. Berlin would like to secure part of provisions similar to the Five Eyes alliance – agreements signed between the US, the UK, Canada, New Zealand and Australia in the second half of the 1940s, aimed at intelligence sharing and a ban mutual bugging. This could spell the end of the last (not including the military presence) relic of Germany's dependence on the US which emerged following World War II and took shape in the shadow of the Cold War. The process of Germany's emancipation in trans-Atlantic relations, which began after Germany's reunification, would be complete. The US is however opposed to such far-reaching changes as it is interested in continued cooperation with Germany without limiting it. Were it not to sign agreements satisfactory for Berlin, this would lead to a protracted crisis of confidence in German-American relations. American security service surveillance in Germany According to the information disclosed in June 2013 by Edward Snowden, a former NSA employee, the US used the PRISM programme in order to run large-scale surveillance operations outside the country, including in the territory of the European Union. According to the Der Spiegel weekly, Germany were one of the countries most targeted, with the NSA intercepting approximately 500 million phone calls, e-mails and text messages at the turn of 2012 and 2013[1]. In July 2013 the German press revealed that the US had also used PRISM in the ISAF mission in Afghanistan with the knowledge and consent of German intelligence and the Bundeswehr. Furthermore, information surfaced that the Federal Intelligence Service (BND) and the Federal Office for the Protection of the Constitution (BfV) use the American spying programme XKeyscore, which gives the NSA the complete access to all data thus collected. On 24 October the news broke out that along with the surveillance of German inhabitants the telephone of the German chancellor, Gerhard Schroeder had been tapped since 2002. Later Angela Merkel received the same treatment. President Barack Obama claims that the US administration was unaware that this was happening. The scandal in connection with the NSA operations in Germany developed in two stages. During the first stage between June and September 2013 allegations appeared that large-scale bugging of telephone connections in Germany was taking place. The largest controversies and firm reactions from German politicians were however caused by the information revealed in October about Chancellor Merkel's telephone being tapped and the scope of co-operation between the German and American security services. The reactions of German politicians The fact that German citizens were being spied upon by the US security services was revealed in the middle of the Bundestag election campaign. The opposition parties (the SPD, the Green Party and the Left Party) tried to make use of the scandal by discrediting the ruling Christian Democrats and Liberals. The liberal FDP sought to emphasise the necessity to protect personal data and civil liberties, which has traditionally been an important item on the party's political agenda. The reaction of the Christian Democrats at both stages of the scandal proved to be the mildest. Nonetheless, even they toughened their stance when further information leaked regarding the methods used by the American agency. Since the beginning of the scandal over the NSA operations in Germany, the federal government in Berlin claims that it did not know about the surveillance of German citizens by Americans, let alone about Chancellor Merkel's telephone being tapped. While MPs from the FDP, in particular Justice Minister Sabine Leutheusser-Schnarrenberger, firmly demanded that the US clarify the issue and be held accountable for it, the Christian Democrats attempted to smooth it over. Chancellor Angela Merkel and Interior Minister Hans-Peter Friedrich called on the US to respect German law. Representatives of the Federal Ministry of the Interior and the German security services paid two visits to the US where they met with their American counterparts and negotiated an agreement on bringing to a halt intelligence operations carried out against each other. On the other hand, in Germany Friedrich emphasised the advantages of co-operation between the security services of the two countries. The reaction of the opposition was much more severe and has led to the establishment of an investigative committee in the Bundestag. Ronald Pofalla, the head of the Federal Chancellery, who coordinates the work of the security services, was among those to be heard by this committee. The SPD and the Left Party criticised the federal government for its inept handling of the situation. During the election campaign for the Bundestag, the Social Democrats also demanded that the work on the free trade agreement between the US and the EU be suspended. The opposition parties reproached the government for being slow to respond to the NSA scandal and for the disproportionate reaction to the revealed scale of the surveillance. Peter Schaar, the Federal Commissioner for Data Protection and Freedom of Information, also criticised the government for its passivity. GMU Patriot Debate Institute 2013 43 File Title After it was revealed that Chancellor Merkel's telephone had been tapped the reactions from politicians began to converge. The government responded more critically than before – Foreign Minister Guido Westerwelle summoned the US ambassador to provide an explanation and Chancellor Merkel termed the NSA operations. The negotiations to sign the agreement about stopping intelligence operations against each other have also been intensified. It is, however, the opposition parties who have been at the forefront of the debate on the NSA’s activity. During the coalition negotiations the SPD held back from attacking the Christian Democrats but still called for the US to be held accountable. It is mainly due to the Social Democrats that the provision regarding the NSA activity was included in the CDU/CSU-SPD coalition agreement[2]. The Left Party and the Greens are calling for the establishment of another investigative committee in the Bundestag, this time to deal with the fact that Merkel’s telephone had been tapped. As proposed by the opposition politicians, this committee would summon Edward Snowden among other people. The Green Party is the most active in this issue as data protection is becoming an increasingly important item on their political agenda. The party's renowned politician Hans-Christian Stroebele even met with Snowden in Moscow in order to discuss the possibility of his appearing before the committee. The reactions of German society German society, which is sensitive to the issue of data protection, has reacted to the information about the NSA surveillance in two ways. On the one hand, a survey commissioned by the public TV station ARD in July 2013 indicates that confidence in the USA has substantially declined from 65% to 49% – for the first time since Barack Obama became US president[3]. In November the number of Germans who believed that the US is a reliable partner for Germany stood at only 35%. The majority of Germans also declared themselves dissatisfied with the position of the federal government on the NSA scandal (over 70% of those surveyed). Part of the intellectuals and politicians whose political agendas are based on the concept of data protection (including the Green Party, the Pirate Party) is vehemently opposed to the surveillance of Internet activity by foreign security services. Seven German-speaking writers have also protested against it; as a group called “Writers Against Mass Surveillance” they have initiated a petition against these practices. On 10 December their manifesto was published by 30 European daily newspapers. On the other hand, a majority of Germans (76%) do not feel threatened by the NSA actions in Germany, and 44% believe that too much significance has been assigned to the surveillance by the American agency[4]. The legal context of the NSA activity in Germany As the media reported and representatives of German ministries announced, the agreements regarding co-operation between the German and American security services which were in force at the time when the scandal broke out date back mainly to the 1960s. They include: an additional agreement to the North-Atlantic Treaty regarding the deployment of military forces, signed in 1963; the law of 1968 relating to limiting the confidentiality of the post and telecommunications (under which the BND shares collected data with the military forces of the allied countries which are deployed in Germany), and the administrative agreements of 1968. Under these provisions the US intelligence services are entitled, as part of the protection of their citizens (initially, the troops deployed in bases in Germany) to use data gathered by the BND wiretapping and to independently run their own data collection operations. Additionally, in 2002 in the context of the war on terror being fought by the US, an agreement was signed about the establishment of a satellite tracking station (SIGNIT) whose tasks would include the protection of the troops on missions, also in Afghanistan. On 2 August 2013 the Federal Ministry of Foreign Affairs of Germany announced that it had terminated the administrative agreement regarding the law on limiting the confidentiality of the post and telecommunications with the US and the UK by mutual consent, through the exchange of diplomatic notes. This does not spell the end of co-operation between the German and American intelligence services but merely the abandonment of a provision which was already a relic of a bygone age. The remaining legal acts which regulate co-operation between the German and American services have not been abrogated. The implications of the NSA scandal In the wake of the information that Chancellor Merkel’s telephone may have been tapped by the NSA and that other German citizens may have been eavesdropped, the government in Berlin is demanding that the present legal framework of intelligence co-operation between the two countries be changed. So far it has enabled close co-operation between Germany and the US but has not included a ban on mutual espionage. Germany at present is seeking to sign two new agreements with the US which would supersede the present regulations: an intergovernmental agreement and an agreement between the intelligence services of the two countries. They will regulate both cooperation between the services and limit the scope of operations of American intelligence agencies in Germany. In the intergovernmental agreement of a political nature, Germany would like to include provisions which would rule out mutual surveillance, economic espionage in bilateral relations, espionage with the use of operational techniques in Germany and the bugging of the heads of the two states. As was reported in Der Spiegel, Germany would like to ensure that certain provisions are included similar to those in the Five Eyes agreements, that is, the agreements between the US, the UK, Canada, New Zealand and Australia signed in the second half of the 1940s with regard to intelligence sharing and prohibiting mutual surveillance[5]. Merkel’s foreign policy advisor, Christoph Heusgen is responsible for negotiating the intergovernmental agreement for Germany, which proves that this document has been given top priority by Chancellor Merkel. There are opinions in Germany that the EU’s largest countries should first conclude similar agreements between themselves since this would strengthen their negotiating position in talks with the US. Officially, Germany has stressed the individual character of these agreements from the outset. This may also mean that it wishes to emphasise the singularity of these German-American documents in the context of attempts to change the basis of relations between the two countries. Nevertheless, the US has ruled out negotiations of similar agreements with a larger number of parties. Already during the current talks Washington is opposed to setting a precedent with regard to the legal exclusion of wiretapping as it fears that similar demands will be made by other states[6]. This may mean that the German GMU Patriot Debate Institute 2013 44 File Title demands will not be met by signing the agreement with the US, which in practice would mean that the current US intelligence operations aimed at Germany will continue. From the German perspective the further co-operation between the German and American intelligence services is necessary in order to guarantee security both for German citizens in Germany and for Bundeswehr troops involved in foreign missions (particularly in Afghanistan). This is mainly due to the US advantage in the field of cybersecurity. With regard to this, the German security services (above all the BND and the BfV) widely use intelligence gathered by the US[7]. The NSA scandal has further intensified the debate on the necessity to extend the cybernetic competences of German intelligence and the defence capacities of counterintelligence to deal with cyber-attacks. This debate has also been part of the discussion over the reform of the BfV and the Federal Office for the Protection of the Constitution (LfV) and co-operation between the services in the case of the NSU scandal (the three-person National Socialist Underground which murdered nine immigrants and a German policewoman in 2000-2007; clarifying the circumstances of the murders and their extreme right-wing background was possible only after one member of the group denounced herself to the police in November 2011 and two other members committed suicide). There is traditional opposition in Germany to the security services being strengthened and to the concentration of their competences (one of the fundamental principles with regard to the work of these services prohibits the intelligence and the investigative competences – Trennungsgebot – being combined). The NSA scandal may thus serve as an argument to persuade public opinion that more competences are needed by the BND and the BfV to enable them to become more effective and less dependent on American intelligence. Extending the competences of the German services will require increased funding for both scientific research, technological development, and the development of the capacities of the services themselves, including personnel. Such measures are presented in the new coalition agreement between the CDU/CSU and the SPD; additional funding is mentioned in order to strengthen the Federal Office for Information Security (BSI) and the Cyber-Defence Centre (Cyber-Abwehrzentrum) and other services in the area of cyber capacities. These are however long-term measures and in the short term Germany will be forced to use information from American intelligence agencies. Representatives of the German services admit that the detection of certain attempted attacks in Germany was possible exclusively due to intelligence obtained from foreign services (due to numerous connections this refers above all to American services) as in the cases of Sauerland-Gruppe and members of Deutsche Taliban Mudschahidin[8]. Furthermore, Germany is interested in intelligence intercepted by the US from the regions of Afghanistan, Pakistan and North Africa and intelligence regarding organised crime and illegal immigration, which may help Germany’s internal security. The conclusions The current crisis of confidence in relations between Germany and the US is the most important one since Germany expressed its opposition to the US intervention in Iraq in 2003 in the UN Security Council. The new agreements currently being negotiated are aimed at mutual non-surveillance and are intended to ease the tension and to reassure public opinion in Germany which demands that Chancellor Merkel respond to this situation. At the same time they will not have an important influence on the present co-operation between the intelligence services of the two countries due to its large scale and the common areas of collecting data which is used by both the US and Germany. America fears setting a precedent and is reluctant to limit its own competences. It will therefore not extend the intelligence alliance with Anglo-Saxon states (the Five Eyes agreement) to Germany and will probably not agree to a bilateral agreement with Germany to regulate new principles of co-operation between the intelligence services, including the ban on mutual espionage. In the long term a revision of the present principles of co-operation would result in the removal of one of the last relics of post-war relations between Germany and the US. Germany would thus enter a further – and perhaps the final – stage of emancipating its foreign policy following the fall of the Berlin Wall, which would see the creation of the basis of co-operation between the two partners. Germany has used the information about the NSA operations to build a new foundation in its transatlantic relations. This foundation is aimed at reflecting Germany’s strong political and economic position as the EU’s most important state which is developing co-operation with the BRICS states and the new regional powers (Gestaltungsmächte). One of Berlin’s goals is to confirm its strong position in the international arena and this may be seen in the country’s efforts to gain permanent membership on the UN Security Council. American opposition to Germany’s proposal regarding the provisions in the agreements means that the German part in the NSA scandal will not be closed and will impact both German-American relations and Germany’s internal relations (for example, the demands made by the opposition that Germany grant asylum to Snowden will resurface). Despite the visit of US Secretary of State John Kerry, which has been scheduled for the beginning of this year (it had initially been thought that the agreements between Germany and the US would be signed during this visit) and Chancellor Merkel’s confirmed visit to the US this year, a breakthrough in bilateral relations should not be expected. They will remain tense and full of mutual distrust. GMU Patriot Debate Institute 2013 45 File Title Wiretapping Bad – Credibility/Obama Wiretapping undermines Obama’s credential Foster 13 Peter Foster is Telegraph Staff Reporter, “Domestic Spying Revelation Could Be Devastating For The Obama White House,” 6-6-13, Business Insider, http://www.businessinsider.com/affect-of-nsa-surveillance-on-obama-2013-6, DOA: 7-1-13, y2k Democratic presidential hopeful Sen. Barack Obama D-Ill., pauses as he talks about the assasination of Pakistan opposition leader Benazir Bhutto as he begins a campaign rally Thursday, Dec. 27, 2007 in Des Moines, Iowa. Egypt protests: Live from Tahrir Square Talk like Egyptians Ladies' men The Obama administration will be bracing itself for a torrent of hostile questions this morning following the apparent revelation that the National Security Agency has been data-mining the phone records of tens of millions of ordinary Americans. Not to be confused with eaves-dropping, or bugging the phones of those suspected of conspiring to commit a terrorist or criminal offence, the top secret court order published by The Guardian appears to show that the NSA has been trawling the anonymous 'metadata' of potentially billions of phone-calls. On the one hand, Americans might take comfort that the 'internals' of their phone conversations — ie the voices themselves — are not being routinely recorded, but on the other, it seems from this leak that potentially everyone with a phone is under some form of surveillance in the USA. Studies have shown that while anonymous, the 'metadata' — records of location data, call duration, unique identifiers — can provide a surprising amount of information, surprisingly quickly when zeroed in on by investigators. For Mr Obama– a president who prided himself on his liberal credentials — this leak is a potentially devastating revelation since it exposes him to attack on two fronts — from both the libertarian Right and the liberal Left. Already the administration has been hammered over its aggressive prosecution of leakers, including what appeared to be an attempt to criminalise a Fox News journalist, James Rosen, for working a source to obtain a leak from the State Department about North Korea. That story caused the New York Times — usually a reliable friend of the Obama administration — to write a seething editorial accusing the Department of Justice of over-reaching, and using its powers to send a "chilling" message to the media. It is not clear how wide the NSA data-mining project goes, it's effectiveness as a counter-terrorism tool in identifying potential terrorist or criminal cells or — indeed — whether it has been used for any other purposes. It appears from previous reports that the NSA's data-mining operation is not new, and has long been suspected — but this is the first clearcut proof, in the shape of a highly unusual leak from the secretive Foreign Intelligence Service Court (Fisa), that the practice is occurring. A report in USA Today newspaper from 2006, quoting anonymous intelligence officials, alleged that the NSA been "secretly collecting the phone call records of tens of millions of Americans" and that the agency was using the data to "analyze calling patterns in an effort to detect terrorist activity". Since September 11 and the passing of the 2001 Patriot Act, the American public has accepted a great deal of inconvenience and intrusion in the name of national security. The publication of this court order will re-open the debate on how far the security services' writ should run. Politically, the difficulty for Mr Obama is that even if the NSA is actually doing nothing different than it did for George W Bush, the American public — particularly on the liberal left — had believed that Mr Obama's administration represented a fundamental departure from the excesses of the Bush years. GMU Patriot Debate Institute 2013 46 File Title Now, with the continued debate over the use of drones, the failure to close Guantanamo, the ultra-aggressive prosecution of leaks even to the point, perhaps, of muzzling a free press — the questions from the public and the media are starting to weigh down on the Obama White House. Already last night, within hours of publication, civil liberties groups who have long warned about the extent of secret surveillance, were jumping on the revelations. "This confirms what we had long suspected," says Cindy Cohn, an attorney at the Electronic Frontier Foundation (EFF), a civil liberties organization that has accused the government of operating a secret dragnet surveillance program told the Washington Post. "I don't think Congress thought it was authorizing dragnet surveillance" when it passed the Patriot Act, Ms Cohn said, "I don't think Americans think that's OK. I would be shocked if the majority of Congressmen thought it's okay." Over the next few days and weeks, expect a fierce and polarizing debate over just what Americans do feel is acceptable, in the name of their national security. Using wiretapping makes Obama lose his credibility and trustworthiness. NYT Editorial Board 13, The Editorial Board, composed of 18 journalists with wide-ranging areas of expertise, “President Obama’s Dragnet” June 6, 2013 New York Times, http://www.nytimes.com/2013/06/07/opinion/president-obamasdragnet.html?pagewanted=all&_r=0, July 1, 2013 NS Within hours of the disclosure that federal authorities routinely collect data on phone calls Americans make, regardless of whether they have any bearing on a counterterrorism investigation, the Obama administration issued the same platitude it has offered everytime President Obama has been caught overreaching in the use of his powers: Terrorists are a real menace and you should just trust us to deal with them because we have internal mechanisms (that we are not going to tell you about) to make sure we do not violate your rights.Those reassurances have never been persuasive — whether on secret warrants to scoop up a news agency’s phone records or secret orders to kill an American suspected of terrorism — especially coming from a president who once promised transparency and accountability. The administration has now lost all credibility on this issue. Mr. Obama is proving the truism that the executive branch will use any power it is given and very likely abuse it. That is one reason we have long argued that the Patriot Act, enacted in the heat of fear after the Sept. 11, 2001, attacks by members of Congress who mostly had not even read it, was reckless in its assignment of unnecessary and overbroad surveillance powers. GMU Patriot Debate Institute 2013 47 File Title Wiretapping Bad – Not Legal Wiretapping has been deemed unconstitutional Lee, Professor of Law at the University of California, 06 (Evan, “The Legality of the NSA Wwiretapping Program,” 06-30-14, EBSCO, bdg) In December 2005, the New York Times revealed that the National Security Agency (NSA) was engaged in the warrantless wiretapping of calls involving Americans.' In the several subsequent lawsuits challenging the wiretapping program, the government had a relatively rough go of it. One district judge stridently ruled the program unconstitutional on multiple grounds/ and another rejected the government's invocation of the "state secrets" doctrine.'' Now, the Bush Administration has reached an agreement with the Foreign Intelligence Surveillance Court permitting that court to review all warrants on all wiretaps in terrorism investigations. Presumably, this moots the existing litigation, which focuses on prospective injunctive relief. Thus it now appears that there will never be a final judgment adjudicating the legality of the wiretapping program, leaving the question to the legal academy. Not legal Jones, Gallup Poll Analyst, 06 (Jeffrey, “Public Remains Divided About Wiretapping Controversy,” 06-30-14, EBSCO, bdg) PRINCETON, NJ -- Politicians and media pundits, among others, continue to question the legality of a Bush administration practice of conducting warrantless surveillance of telephone conversations between U.S. citizens living in the United States and suspected terrorists living in other countries. Last week, Attorney General Alberto Gonzales defended the practice before the Senate Judiciary committee, but his answers failed to satisfy many members of the committee. Public attention on the wiretapping controversy remains high, and opinion on the matter remains divided and has not changed in recent weeks. The poll also finds essentially no change in the public's views about the matter. Forty-seven percent believe the Bush administration was right in wiretapping the telephone conversations without getting a court order, while 50% say it was wrong to do so. In late January, 46% said the administration was right and 51% wrong. In early January, Americans were slightly more inclined to say the Bush administration was right (50%) than wrong (46%). Not legal Harris, Amember of the Washington Bureau of the St. Louis Post- Dispatch, 49 (E.A., “Is Wiretapping Legal?” 06-30-14, EBSCO, bdg) President Roosevelt, in authorizing its use, was careful to point out that the problem of balancing the need for law-enforcement agents with the need for protection of citizens against abuse of such power raised "the most delicate problem in the field of democratic statesmanship." The federal government has no statute governing the use of wire-tapping, but even New York State, which took the lead among the commonwealths in applying a policy of supervised wire-tapping for crime detection, has found the state statute in large measure abused or ignored. Not legal Desai, Assistant Professor of Law at the University of Wisconsin, 07 (Anuj, “Wiretapping Before the Wires: The Post Office and the Birth of Communications Privacy,” 06-30-14, EBSCO, bdg) In December 2005, the New York Times reported that the National Security Agency (NSA) had been engaged in warrantless surveillance of international communications—telephone calls, e-mails, etc.— made from within the United States.' The ensuing outrage included several lawsuits claiming that the government and various telecommunications companies had violated a host of statutes, particularly the Foreign Intelligence Surveillance Act (FISA), which establishes specific procedures for the government to follow prior to engaging in domestic surveillance for intelligence purposes. At the same time, a few of the lawsuits and some commentators went even further, alleging that the NSA surveillance program violated the Fourth Amendment, in essence arguing that even Congress could not authorize GMU Patriot Debate Institute 2013 48 File Title such surveillance. In August 2006, a federal district judge in Detroit agreed."* One of the unstated premises of the court's holding was that the Fourth Amendment protects the privacy of long distance communications transmitted through a communications network, a premise that was unequivocally correct as a matter of current Fourth Amendment doctrine. GMU Patriot Debate Institute 2013 49 File Title Wiretapping Bad – Privacy Digital wiretapping undermines private security---damages individuality Keen, 2013 Andrew Keen, Andrew Keen is a British-American entrepreneur, professional skeptic and the author of "The Cult of the Amateur" and "Digital Vertigo.", “Why we're all stuck in the digital transit zone with Snowden” CNN,http://edition.cnn.com/2013/06/28/opinion/keen-snowden-digital-monitoring/index.html?hpt=hp_c Jun 30 2013 NS Editor's note: Editor's note: Andrew Keen is a British-American entrepreneur, professional skeptic and the author of "The Cult of the Amateur" and "Digital Vertigo." Follow Andrew Keen on Twitter. (CNN) -- So where, exactly, is Edward Snowden? President Vladimir Putin knows. But Russia's chief snooper isn't telling. Not exactly, anyway. The ex-KGB officer and master of doublespeak described Snowden as a "free man" ( biding his time in a "transit area" in Moscow's Sheremetyo airport. So free, of course, that the young American ex-surveillance officer -- watched around the clock by hawkish Russian security agents - has become as ubiquitously and transparently invisible as the brightly lit subject of a dystopian Kafka story. Read more: How to hide your data from Internet Snowden isn't alone in his fate. The truth is that anyone who uses the Internet is also all in that brightly lit "transit area." I'm afraid we are all in danger of becoming Edward Snowden now. "Mr. Snowden really did fly into Moscow," Putin said, with just the glimmer of a secret policeman's smile. "For us it was completely unexpected." Oh, yes, it must have been totally unexpected. So unexpected, indeed, that the area between passport control and the arrival gates in Sheremetyo airport has been transformed into a high security hotel designed to both shield Snowden from public view and to watch him. Yes, Sheremetyo is beginning to mirror the Internet, a vast all-seeing digital panopticon, a network in which somebody might be watching everything we do, a place where individual privacy no longer exists. And Snowden's fate -- of being watched around the clock, of having zero privacy -- could easily become all of our fates. Opinion: In digital age, everyone is becoming a spook Ironically, it's Snowden himself who has most clearly revealed to us our fate. In secret National Security Agency (NSA) documents which Snowden gave to the Guardian newspaper, we now know that for more than two years, the Obama administration allowed the NSA, to continue -- as the newspaper put it -- "collecting vast amounts of records detailing the email and internet usage of Americans." Doublespeak isn't, of course, unique to the Russian security apparatchik. The Americans are pretty skilled at it too. "I'm not going to say we're not collecting any internet metadata," thus one Obama Adminstration official told the Washington Post. But, as the Guardian notes, the distinction between metadata and data is mostly semantic. The truth is that the NSA has been data-mining us all of us to death -- Americans and foreigners alike -- in their paranoid search for enemies of the American state. Last year I wrote a book warning about this and called it "Digital Vertigo" -- in homage to Alfred Hitchcock's nightmarish movie about a San Francisco private eye whose life is destroyed by both surveillance and voyeurism. Some people said I was exaggerating. Now they know I wasn't. By being able to read our emails and Internet usage, by harvesting over a trillion metadata records, the NSA knows absolutely everything about us. They know our tastes, what we think, where we go, what we eat, how we sleep, when we are angry, when we are sad. They have become our eyes and our brains. Hitchcock's 20th century movie about surveillance and voyeurism really has become the truth about 21st century digital life. More from Andrew Keen: Should we fear mind-reading future tech? Deal offered for Snowden's return Where is Edward Snowden? It's almost as if the agents at the NSA have become as omniscient as Google or Facebook. The really terrifying thing about Snowden's revelations is the doublethink articulated by the Silicon Valley technology companies whose pipes and platforms have been hijacked by the snooping NSA bureaucrats. Google, Facebook and the rest all, of course, claim, in the sophisticatedly obtuse doublespeak of their lawyers, both ignorance and innocence about the NSA allegations. But, as Techcrunch founder Mike Arrington notes, the truth about Silicon Valley's complicity is this horror story is much murkier, much more like the dark transit area in Sheremetyo airport where Vladimir Putin's spooks are monitoring Snowden's every movement. Silicon Valley's fetish with radical transparency, with encouraging us to broadcasting everything we do and think, is destroying our privacy. And without privacy, I warn, our individuality, the very thing that defines us as unique human-beings, is fatally compromised. Snowden's fate, whether he ends up in Ecuador or Guantanamo or stays in Sheremetyo airport, is to be watched by spooks for the rest of his life. Snowden, the "free man" in Putin's doublespeak, will never truly be alone again. To avoid becoming Edward Snowden, we need to be much more critical of the invasiveness of Silicon Valley's big data companies. We must recognize the creepiness of all-seeing location devices like Google Glass. Most of all, we need to remember that the Internet is never really private so our most intimate thoughts are best kept to ourselves. GMU Patriot Debate Institute 2013 50 File Title Visibility is a trap. Remaining free in our digital age requires us to be alone. We have to teach the internet how to forget. We must build an off-switch to the internet, to reinvent it as a dark space, a place where nobody can know what anyone else is doing. GMU Patriot Debate Institute 2013 51 File Title Wiretapping Bad – Privacy Grossman, non-staff member of the cato institute/ u.s. Policymaker in washington, june 4, 2009 (andrew, “the state secret protection act: unnecessary, unconstitutional, and undemocratic”, 6-04-09, heritage foundation, http://www.heritage.org/research/testimony/the-state-secret-protection-act-unnecessary-unconstitutional-and-undemocratic) The misnamed state secret protection act of 2009 (h.r. 984) is dangerous, in terms of both its effect on national security and the violence it would do to the constitutional separation of powers. Congress should be aware of the following key points: the state secrets privilege has a 200 year history in the united states and has existed in essentially its present form for 135 years. It has been used by every president since lyndon johnson, up to and including president barack obama. There is absolutely no evidence of abuse of the state secrets privilege. Data from 1954 through 2008 show that its use is rare. In reported opinions, the privilege was asserted just seven times in 2007, and three times in 2008. There is no evidence that the state secrets privilege is being used more frequently than in the past or in cases where it is not needed. There is no evidence that it is being used to stifle cases on political grounds. There is no evidence that judges are unduly deferential to the executive when it is asserted; the trend is actually in the opposite direction. The state secret protection act would force the government to admit highly classified secrets, such as the identities of spies, in the course of litigation, putting national security at risk. The state secret protection act would give activists a "heckler's veto" over many national security programs created by the democratic branches of government. The state secret protection act attempts to transfer powers clearly assigned to the president to judges, in violation of the constitution. It is unconstitutional. The state secret protection act is a cynical attempt by congress to duck tough decisions in the national security arena--where bad decisions can have catastrophic consequences--by passing the buck to the courts. The state secrets privilege is only one of several "immunities" that can bar litigation altogether. For example, courts have cited the speech or debate clause to dismiss suits against members of congress and other legislators involving invasion of privacy, defamation, wiretapping, incitements to violence, age, race, and sex discrimination, retaliation for reporting sexual discrimination, and larceny and fraud. The modern application of the privilege was defined in a 1953 case, u.s. v. Reynolds. The reynolds framework carefully balance the sometimes harsh results of the state secrets privilege--the exclusion of relevant evidence or dismissal of a claim altogether--with the genuine needs of u.s. national security. Seven separate requirements, including department of justice review and "personal consideration" by high-ranking federal officials, ensure that the state secrets privilege is used only when necessary to protect national security. My name is andrew grossman. I am senior legal policy analyst at the heritage foundation. The views i express in this testimony are my own, and should not be construed as representing any official position of the heritage foundation. My testimony this afternoon concerns the misnamed state secret protection act of 2009 (h.r. 984, "sspa"), which would regulate, and in some cases prohibit, the federal government's invocation of the state secrets privilege to prevent the disclosure of sensitive national security information and programs in civil litigation. The sspa is dangerous, in terms of both its direct effect on national security and the violence it would do to the constitutional separation of powers, and i thank the subcommittee for holding this hearing and considering my testimony on the consequences of this legislation. As i will explain, members of congress should be wary of the sspa for three reasons. First, it is unnecessary because there is no evidence of abuse of the state secrets privilege. Second, it raises serious constitutional concerns, particularly as regards the article ii duties assigned to the president. Third, the legislation can be seen as a cynical attempt by congress to evade its constitutional duty to make tough decisions about our national security, and this abdication puts the nation's safety at risk. For these reasons, congress should resist succumbing to pressure from political partisans and activists to force the disclosure of closely held national security information in civil lawsuits. I. No evidence of abuse on the terms of the justifications offered by its supporters, the sspa is unnecessary. Contrary to repeated claims by civil liberties groups and others, recent use of the state secrets privilege is not different in kind or quantity than in the past. Despite more attention paid to the privilege in recent years--largely as a result of political opposition to the policies of the george w. Bush administration and their embrace by the obama administration--the strong accountability mechanisms built into it continue to guarantee that it is not overused or otherwise abused. To understand this point requires some understanding of the privilege's historical pedigree. Though usually discussion of the state secrets privilege begins with the supreme court's 1953 decision in united states v. Reynolds[1], that approach presents a pinched view of the privilege's history and scope--and perhaps this is deliberate. The privilege's first acknowledgement in the law of the united states--or at least the first in written reports uncovered by modern scholars--is typically accredited to chief justice john marshall, who referred obliquely to executive privilege in marbury v. Madison and, while riding circuit, to an intelligence-based privilege in the trial of aaron burr for treason. In the former case, marshall allowed that while attorney general levi lincoln could not be "obligated" to disclose "any thing [that] was communicated to him in confidence," the fact whether the disputed commissions had been found in the office of the secretary of state the disposition of the commissions "could not be a confidential fact," thereby relegating marshall's brief description of the privilege to dicta.[2] marshall elucidated that privilege's application to secret communications and intelligence while presiding over the treason trial of aaron burr. Burr sought to admit a letter from general james wilkinson, an essential witness against him, to president jefferson, over the government's objection that the letter "contains matter which ought not to be disclosed."[3] the balancing of a party's need with the necessity of government secrecy in certain matters "present a delicate question," explained marshall--one "which, it is hoped, will never be rendered necessary in this country."[4] yet again, marshall sidestepped the need for such balancing, because GMU Patriot Debate Institute 2013 52 File Title "certainly nothing before the court which shows that the letter in question contains any matter the disclosure of which would endanger the public safety."[5] but "if it does contain any matter which it would be imprudent to disclose, which it is not the wish of the executive to disclose, such matter...will, of course, be suppressed."[6] in such a case, said marshall, "much reliance must be placed on the declaration of the president."[7] and, marshall made clear, "the propriety of withholding it must be decided by [the president], not by another for him."[8] though the issue was made moot when jefferson, pressed to make a decision, consented to admission of the letter "excepting such parts as he deemed he ought not to permit to be made public,"[9] this formulation, as well as its rationale, would greatly influence the reynolds court. The issue would next arise in u.s. courts in the matter of totten v. United states, the supreme court's 1875 decision which, though brief, merits careful consideration. Totten, heir to one william lloyd, brought an action against the united states claiming that lloyd had entered into a contract with president lincoln to ascertain troop placements in the south and "other information as might be beneficial" to the north during the civil war.[10] such a contract would ordinarily be binding, justice field explained for the court, but not in the circumstances presented by this particular case: "the service stipulated by the contract was a secret service; the information sought was to be obtained clandestinely, and was to be communicated privately; the employment and the service were to be equally concealed."[11] on the basis of these facts, the court propounded two rules, quite intertwined, one narrow and one broad. The narrow rule, that offered in most discussions of the case,[12] is simply that no suit may require disclosure of a spy's employment by the government. This was not framed as a privilege but as an absolute bar to litigation. Without such a bar, "whenever an agent should deem himself entitled to greater or different compensation than that awarded to him, the whole service in any case, and the manner of its discharge, with the details of dealings with individuals and officers, might be exposed, to the serious detriment of the public."[13] as the court explained, "a secret service, with liability to publicity in this way, would be impossible."[14] it is thus an implied term of such contracts that the very act of suing for compensation is a breach of contract that defeats recovery. Yet it is the broader rule, though less discussed by academics, which has proven more influential to the development of the law. Put simply: it may be stated as a general principle that public policy forbids the maintenance of any suit in a court of justice, the trial of which would inevitably lead to the disclosure of matters which the law itself regards as confidential, and respecting which it will not allow the confidence to be violated.[15] among these confidential matters are those typically covered by the various privileges, such as between a husband and wife or patient and physician. But, said the court, "much greater reason exists for the application of the principle to cases of contract for secret services with the government, as the existence of a contract of that kind is itself a fact not to be disclosed."[16] thus, in some circumstances relating to national security, lawsuits that would inevitably disclose state secrets, such as a spy relationship, are simply barred, because their very existence "is itself a fact not to be disclosed" and disclosure would be "a detriment to the public."[17] the court would affirm this rule's vitality in reynolds[18] and subsequently reaffirm it in a 2005 case.[19] by 1875, then, the basic contours of the law were set. In cases where parties sought to subpoena or otherwise introduce state secrets, the courts would exclude materials that the executive determined to be "imprudent" to disclose, in effect giving the executive a privilege to protect certain information from disclosure. And lawsuits that, at their core, concern secret government relationships and activities, such as spy contracts, would simply be barred as non-justiciable. Even at this early date, the state secrets "privilege" was not strictly a privilege in every case; sometimes it would be a "threshold question" that could defeat a claim at the outset of the case. Understood in this historical context, reynolds was less a revolution than a refinement, one that began the task of regularizing invocation and application of the privilege with respect to modern civil procedure. The case was brought under the federal tort claims act (ftca) by the widows of three civilians killed in the crash of an air force bomber testing "secret electronic equipment."[20] the government refused to disclose its post-accident report, arguing that disclosure would, according to an affidavit of the judge advocate general of the air force, hamper "national security, flying safety, and the development of highly technical and secret military equipment."[21] the district court resolved the case in the plaintiffs' favor after the government declined to present the report for ex parte, in camera inspection.[22] the third circuit affirmed, holding that the ftca had waived any privilege that the government might have had.[23] in an opinion by justice vinson, the supreme court expounded a new framework for invocation of the privilege, drawing freely from legal precedent: the privilege belongs to the government and must be asserted by it; it can neither be claimed nor waived by a private party. It is not to be lightly invoked. There must be formal claim of privilege, lodged by the head of the department which has control over the matter, after actual personal consideration by that officer. The court itself must determine whether the circumstances are appropriate for the claim of privilege, and yet do so without forcing a disclosure of the very thing the privilege is designed to protect.[24] of this final step, the court provided some elucidation by analogy to the privilege against self-incrimination, as described by justice marshall during the burr trial. A court should consider "all circumstances of the case" in determining whether "there is a reasonable danger that compulsion of the evidence will expose military matters which, in the interest of national security, should not be disclosed."[25] but once the court has reached that determination, "the occasion for the privilege is appropriate, and the court should not jeopardize the security which the privilege is meant to protect by insisting upon an examination of the evidence, even by the judge alone, in chambers."[26] courts thus have significant flexibility and discretion in determining whether the government's use of the privilege is appropriate, but their inquiry is limited, with great focus, to that question alone. It also recognizes that in some instances, particular evidence will pose such a significant and obvious danger to national security that even in camera review is inappropriate. (after all, among other concerns, very few judges review evidence in secured rooms, encased in reinforced concrete and with doors that seal, designed to prevent eavesdropping or outright theft.[27]) the necessity of the evidence to the party seeking to admit it is also a relevant consideration. "[t]he showing of necessity which is made will determine how far the court should probe in satisfying itself that the occasion for invoking the privilege is appropriate."[28] the district court, explained the supreme court, should have been satisfied with the government's assertion alone, for the plaintiffs' need was tempered by the availability of alternative evidence on the same factual allegations. This is not, however, a balancing test, weighing necessity against risk. The court was careful to explain that no showing of necessity, no matter how GMU Patriot Debate Institute 2013 53 File Title great, may overcome a determination that the privileges was properly asserted.[29] at most, great necessity may prompt a judge to scrutinize the basis of the assertion more closely. It is worth, at this point, a brief historical detour. Some have argued, in recent years, that the declassified accident report proves that the privilege was asserted unnecessarily and improperly in reynolds--in other words, that there was no risk at all that giving the report to the plaintiffs or court would have risked disclosing national security secrets. Courts that have examined this issue directly, however, reject that claim. After finding the declassified report, heirs of those killed in the crash brought suit against the united states in 2003, alleging that the air force had misrepresented the nature of the information contained in the report and thereby committed fraud on the court by improperly asserting the privilege.[30] a district court and the third circuit directly considered the issue of whether the government officers asserting the privilege had committed perjury; both courts rejected the accusation.[31] the courts found that the report contained extensive technical information about the b-29 bomber, as well as details about the electronic equipment (a classified experimental radar system) that was being tested.[32] as the district court explained, "details of flight mechanics, b-29 glitches, and technical remedies in the hands of the wrong party could surely compromise national security."[33] in short, in this much-assailed case, history has confirmed that the assertion of the privilege was appropriate. Since reynolds, the courts have done little more than flesh out its approach. One notable development was judicial embrace of the analogy of foreign intelligence gathering to the construction of a mosaic: "thousands of bits and pieces of seemingly innocuous information can be analyzed and fitted into place to reveal with startling clarity how the unseen whole must operate."[34] this view counsels strong deference to the executive's assertion of the privilege because "what may seem trivial to the uninformed [e.g., a judge], may appear of great moment to one who has a broad view of the scene and may put the questioned item of information in its proper context."[35] another notable development was the taxonomy of possible dispositions of a case in which the privilege has been asserted[36]; these are incorporated into the discussion below. Most importantly, the courts built up a body of case law that would provide guidance in evaluating assertions of the privilege. The reynolds framework can be seen as a deliberate effort to balance the harsh reality of the state secrets privilege--the exclusion of relevant, and perhaps determinative, evidence or dismissal of a claim altogether--with the genuine needs of u.s. national security. It ensures that assertion of the privilege comports with procedural due process as it is practiced today and, to the extent it intrudes on substance, provides a check against abusive assertions. This dual nature--protecting procedural and substantive rights--is evident in the long list of requirements and protections that, post-reynolds, must be satisfied to ensure that the privilege is not "lightly invoked." first of all, the privilege may be invoked only by the united states, and not by a private litigant. This requirement alone greatly circumscribes the potential for abuse, as relatively few civil cases touch upon national security or classified matters. Second, the privilege may not be asserted by a line attorney or even supervising attorney but only by the head of the department that has control over the matter, usually an agency head. This requirement ensures that the decision to assert the privilege will be subject to more extensive review, by more individuals and at higher levels of responsibility. It is analogous to the similar requirements in the foreign intelligence surveillance act (fisa) that high-ranking officials, such as the attorney general and national security advisor, certify that applications made to the fisa court meet the exacting requirements of the law.[37] indeed, recognizing the value of independent certifications made by high-ranking officials, paired with precise judicial review, congress greatly increased the fisa's reliance on this mechanism in the fisa amendments act of 2008.[38] third, it must be formally invoked. This requires a separate determination of the propriety of invoking the privilege by the department of justice, which is charged with conducting litigation for the united states and supervising litigation carried out by the government.[39] an agency head, acting alone, generally cannot assert the privilege without the concurrence of the department of justice. This ensures not only additional levels of review and accountability, but also that the proposed assertion of the privilege will be evaluated by legal and security specialists who will ensure that the united states uses the privilege in a consistent fashion that promotes national security over any agency's parochial interests. Department of justice lawyers are also especially attentive to identifying and rejecting weak claims that might ultimately undermine the privilege, providing another check against overuse of the privilege and its assertion in cases in which it is not necessary. Fourth, the department head asserting the privilege must undertake "actual personal consideration" of the matter, just as justice marshall ruled was required of the president in the burr trial. For a high-ranking official, typically carrying great responsibility, this is a significant and potentially burdensome requirement, demanding that he or she personally review the evidence or matter at issue and produce a declaration (or several in cases where classified and unclassified declarations are required) explaining, to the satisfaction of the court, why disclosing the evidence at issue would endanger national security. Typically, both requests and declarations will be reviewed by agency counsel and mid-level officials.[40] only then are declarations signed and filed--under the penalty of perjury. Fifth, after many levels of executive-branch review, the "court itself must determine whether the circumstances are appropriate for the claim of privilege"--that is, whether the government has demonstrated that there is a "reasonable danger" disclosure would harm national security.[41] reynolds counsels that the privilege is not to be "lightly accepted" and that the showing of necessity of the party seeking to compel the evidence "will determine how far the court should probe" in determining whether the privilege is appropriate.[42] this inquiry may even include examination of the evidence at issue in camera.[43] only when a claim is not supported by necessity will assertion of the privilege, with nothing more, suffice to invoke it. That, however, is a rare occurrence because, as explained by carl nichols, former deputy assistant attorney general in the civil division of the department of justice, the government's disclosures to the court are typically extensive: in making its determination, moreover, a court often reviews not just the public declarations of the executive officials explaining the basis for the privilege, but also classified declarations providing further detail for the court's in camera, ex parte review. One misperception about the state secrets privilege is that the underlying classified information at issue is not shared with the courts, and that the courts instead are simply asked to dismiss cases based on trust and non-specific claims of national security. Instead, in every case of which i am aware, out of respect for the judiciary's role the executive branch has made available to the courts both unclassified and classified declarations that justify, often in considerable detail, the bases for the privilege assertions.[44] in a recent opinion, in a case that aroused no little controversy due to the government's GMU Patriot Debate Institute 2013 54 File Title assertion of the state secrets privilege, the ninth circuit professed itself "satisfied that the basis for the privilege is exceptionally well documented."[45] among the evidence filed by the government for in camera review was the complete document which it sought to protect from disclosure.[46] in reaching its decision to affirm the exclusion of the document, the court relied on "[d]etailed statements," including classified information, that "underscore that disclosure of information concerning the sealed document and the means, sources and methods of intelligence gathering in the context of this case would undermine the government's intelligence capabilities and compromise national security."[47] sixth, the court, if it upholds assertion of the privilege, must decide what effect that decision has on the case before it. Assertion of the state secrets privilege does not, in theory and in fact, necessarily result in the dismissal of a case. As in reynolds, the case may be able to proceed, just without the privileged evidence. In others cases, where the evidence is crucial, it will not. This is no different than the application of any other privilege that results in the exclusion of evidence. For example, the attorney-client privilege protects communications between criminal defendants and their lawyers that would be extremely to government prosecutors; in some instances, without this evidence, prosecutors are unable to bring charges. Another example is the speech or debate clause, which grants members of congress a testimonial privilege under which they "may not be made to answer questions" no matter the gravity of the claim involved.[48] it should not be controversial, then, when cases are not allowed to proceed for the same reasons that apply in other contexts. This generally occurs when, once the privileged evidence has been excluded, the plaintiff is simply unable to establish a prima facie case. This is the same as summary judgment following invocation of the doctor-patient or attorney-client privilege. But the state secrets "privilege" is, as described above, sometimes more than a privilege, because it protects against the disclosure of secret facts, rather than just the use of certain evidence in court. For example, it is no violation of the doctor-patient privilege to prove the factual matters confessed to a psychiatrist by other means--e.g., an invoice or an email; under the state secrets "privilege," however, the very facts themselves may be off-limits. This would include, for example, lawsuits based on covert espionage agreements.[49] in the reynolds court's words, cases are simply non-justiciable when "the very subject of the action...was a matter of state secret."[50] or as formulated in totten: "[p]ublic policy forbids the maintenance of any suit in a court of justice, the trial of which would inevitably lead to the disclosure of matters which the law itself regards as confidential."[51] this is, as in totten and tenet v. Doe, a complete bar on litigation. It is also, as the supreme court explained in tenet, a "threshold question," like abstention, that a court may resolve before it even addresses jurisdiction.[52] yet this seemingly harsh result is not unusual in the law. For example, the speech and debate clause, another of the constitution's means to affect the separation of powers[53], renders members of congress, as well as their staff and invited witnesses, completely "immune from suit" for a wide variety of conduct that is "within the sphere of legitimate legislative activity."[54] on this ground, the courts have dismissed claims of invasion of privacy,[55] slander and libel,[56] civil rights violations,[57] wiretapping,[58] incitements to violence,[59] violations of first amendment rights,[60] age discrimination,[61] racial discrimination,[62] sexual discrimination,[63] retaliation for reporting sexual discrimination,[64] larceny and fraud,[65] and mccarthyism.[66] qualified immunity, as well, has a similar effect, shielding government officials from immunity for violations of civil rights and ending cases before the plaintiff has had an opportunity to conduct discovery.[67] as the supreme court has explained, this is so because "broad-ranging discovery and the deposing of numerous persons...can be peculiarly disruptive of effective government."[68] in addition, dismissal or summary judgment may be mandated when the assertion of the privilege denies the defendant a complete defense to the claim.[69] this remedy may be available only when the court, through its review of affidavits and other materials to resolve the privilege claim, is also satisfied that the defense is availing.[70] any other result "would be a mockery of justice," observed one court.[71] thus, outside the core of the state secrets privilege--that is, lawsuits specifically targeted at national security secrets--a judge exercises his or her usual discretion in determining whether a case will proceed, providing yet another procedural check on assertion of the privilege. Only when a lawsuit moves from the periphery to the core of clandestine operations is this discretion limited--for example, wholesale challenges to government intelligence programs. This is as it should be, considering the purpose of the privilege. The objects of these suits should usually be pursued, if at all, through the political process. Seventh and finally, as with other privileges, assertions of the state secrets privilege are appealable and are usually reviewed de novo by the courts of appeal.[72] this means that the appellate court accords the trial court's application of the standard no deference whatsoever and considers the issue anew. Aggrieved appellants thus have the opportunity for a second bite at the apple, to correct any legal errors, such as undue deference to the government's assertion, the trial court may have made. Further, in some cases, appellate courts have taken the unusual step of reconsidering factual determinations made at the trial court level[73]; when this occurs, the appellant is essentially afforded a second trial--and a second opportunity to defeat aspects of the factual basis underlying the assertion of the privilege. As this exercise makes clear, the requirements of the reynolds framework provide extensive protections against abusive or improper assertions of the state secrets privilege and afford adverse parties significant opportunity to challenge both its invocation and its effect. The evidence supports this conclusion. One source of evidence is quantitative analysis of cases. It is difficult, of course, to provide an exact count of the number of cases in which the privilege has been at issue, because not all cases result in published opinions. It is possible, however, to catalogue all published opinions adjudicating assertions of the privilege. Robert chesney did this in a 2007 article, providing an appendix listing all such opinions since reynolds through 2006.[74] the data collected in that useful article disproves many of the claims made about the state secrets privilege, particularly those concerning its use during the george w. Bush administration. As should be expected, given the procedural hurdles and checks, assertion of the state secrets privilege is rare. From 1954 through 2006, the privilege was adjudicated in 89 cases.[75] most of these cases concern intelligence operations; a few concern each of military technology, military contracts, and diplomatic communications. In most, but not all, the assertion of the privilege was upheld. This demonstrates that the government uses the privilege only sparingly, when necessary, and that courts are willing to push back when they doubt its application. A few trends in the usage of the privilege are visible, though the paucity of cases prevents confident analysis. Assertion of the privilege was rare until the early 1970s, when cases became more frequent, reaching GMU Patriot Debate Institute 2013 55 File Title a peak in 1982. This rise coincided somewhat with popular concern over the government's domestic intelligence activities--the subject of many of these cases--and dissipated as reforms engineered by the executive and congress branch reined in excesses. There was another surge in the early 1990s, and then one beginning in 2004, about two years into the war on terrorism and around the time that the media began to report on classified programs. The final year of chesney's study, 2006, witnessed seven assertions of the privilege in published opinions--a seemingly low number but, in fact, a new high. Despite claims to the contrary, the privilege was not claimed more frequently by the bush administration. At least through 2006, chesney concludes, the data "does not support the conclusion that the bush administration chooses to resort to the privilege with greater frequency than prior administrations"--that is, the rate of assertion of the privilege relative to the amount of litigation implicating classified national security programs is little changed.[76] this is a more appropriate measure than just counting the number of cases because, unlike with prosecutions, the government does not control the number of civil cases filed that implicate state secrets. Indeed, the more irresponsible and obviously barred suits that are filed, the more the government will be forced to assert the privilege. I attempted to replicate chesney's methodology to provide data for the years 2007 and 2008. Federal courts, i found, issued seven reported opinions adjudicating the state secrets doctrine in 2007, and just three in 2008-for ten in total.[77] by comparison, the government contractor defense was adjudicated in more than twice as many published opinions over the same period. One reason for the decrease between 2007 and 2008 may be the aggregation of several lawsuits challenging national security agency programs in one court, perhaps resulting in fewer total opinions. This result and chesney's data are strong evidence that the privilege is asserted only rarely and that it is rarely, if ever, misused. After all, cases demonstrating misuse or inappropriately harsh results, such as dismissal based on a peripheral connection to national security, are those more likely to be contested and appealed, whether by the government or the party against whom the privilege has been asserted. Such cases, then, are disproportionately likely to result in published opinions. Similarly, activist litigation intended to alter government policies or strike down government programs are of some public interest, receive significant coverage in the media, and are often aggressively litigated. These too are more likely to result in appeals and published opinions. There is also no evidence that the privilege is being asserted with respect to different kinds of subject matter than it was in the past. Chesney's data show that surveillance programs were the subject of extensive litigation in the 1970s and 1980s, resulting in some assertions of the privilege.[78] the other regular subjects of cases in which the privilege was asserted during that period were employment and contractual disputes within the military and the intelligence agencies and cases risking the disclosure of purely technical information, such as the operation of stealth aircraft technology.[79] the data, concludes chesney, "does not support the conclusion that the bush administration [was] breaking new ground with the state secrets privilege" in terms of subject matter.[80] the 2007 and 2008 data do not alter that conclusion. Five of the opinions were in cases challenging nsa intelligence programs.[81] two concerned "extraordinary rendition."[82] two concerned the valerie plame affair and her attempt to collect damages from the federal government, as well as other defendants, for the disclosure of her identity.[83] (neither of the plame opinions directly adjudicated an assertion of the privilege but both considered it relevance to a bivens inquiry.) The remaining case concerned allegations that a cia agent stationed in rangoon, burma, had tapped the phone of a drug enforcement administration agent also stationed there.[84] there is also no evidence that the government has sought harsher remedies, such as dismissal, more often than in the past. Indeed, the government sought, and received, dismissal in the first state secrets case decided after reynolds in 1954 and has sought dismissal regularly since the early 1970s.[85] roughly, the bush administration sought dismissal or summary judgment in 70 percent of the cases in which it asserted the privilege through 2006. The clinton administration sought dismissal or summary judgment in 55 percent. Both were more likely to seek summary disposition in cases relating to intelligence policy and employment disputes involving classified programs. The bush administration simply faced a higher proportion of these suits, leading it to seek summary disposition in a slightly higher proportion of cases. There is also no evidence that the courts have accorded inappropriate deference to executive assertions of the privilege in recent years. In cases with reported opinions, courts granted the government's requested relief 83 percent of the time during the clinton administration. Through 2006, courts granted the bush administration its requested relief 65 percent of the time; many of the rejections were in cases alleging warrantless domestic surveillance. Including the data from 2007 and 2008 reduces the bush administration's "win rate" to just 60 percent. And in its first few months, the obama administration has racked up a single loss, in the ninth circuit[86], and a looming loss (several procedural issues are disputed) in district court.[87] if anything, the courts have become less deferential to executive assertions of the privilege. Finally, the privilege has been embraced by the obama administration as a necessary tool to protect national security. This should come as no surprise, despite the charged rhetoric of the 2008 presidential campaign; the privilege has been used by every presidential administration since the johnson administration asserted it in 1967 to block discovery concerning warrantless surveillance by the fbi. (that assertion was rejected by the court.) The new administration declined to change course in mohamed, a suit challenging the cia's "extraordinary rendition" program; the government lawyer responding to insistent questions from a ninth circuit judge stated that the position had been "thoroughly vetted with the appropriate officials within the new administration" and that "these are the authorized positions."[88] in al-haramain, a suit by an islamic charity accused of funding terrorism challenging an intelligence program, the obama administration stated, in a motion challenging the court's refusal to sustain its assertion of the privilege, that the "disclosure of classified information ... Would create intolerable risks to national security."[89] the administration has stated that, if the court orders it to disclose details about the program to the charity, it will appeal swiftly.[90] it is significant that president barack obama, who as a candidate was so critical of the bush administration's use of the privilege[91], has come to agree that, in some cases, its use is necessary and legitimate. To summarize this review of cases applying the privilege, there is no evidence that the state secrets privilege-quite separate from the underlying legal doctrines that implicate the merits of any case--has been abused or misused during the bush administration or, more broadly, at all. There is no evidence that the privilege is being used frequently or in cases where it is not needed, no evidence that it is being used to stifle cases on political grounds, and no evidence that judges are unduly deferential to the executive GMU Patriot Debate Institute 2013 56 File Title when it is invoked. The fact that some cases concerning government policies have been bounced out of court by the privilege is both unexceptional (assertion of any privilege may, in some cases, defeat a claim) and appropriate--many of these cases, had they been allowed to proceed, would quite obviously have exposed secrets that would put u.s. national security at risk. Finally, the privilege has been employed sparingly by all administrations since lyndon johnson was in office, including the current administration, demonstrating that protecting state secrets from disclosure is not, and should not be, a partisan or ideological issue. This would seem to defeat any argument in favor of substantively limiting or procedurally hobbling the state secrets privilege, such as the sspa would do. The act would radically alter the privilege, placing a much higher--and at times, insurmountable--burden on the government to protect national security information that, in other contexts, is protected by strict laws and regulations carrying heavy criminal penalties for their violation.[92] in general, the act would require the government to disclose all evidence it claims is privileged to the court and then prove that public disclosure of each piece of evidence "would be reasonably likely to cause significant harm to the national defense or diplomatic relations of the united states"--a higher standard than that articulated in reynolds. Gone would be reynold's sliding scale approach based on necessity, replaced with a mandate that the court personally review every bit of evidence, no matter the obviousness of the consequences of disclosure, the lack of necessity, or the risk of interception during proceedings, as acknowledged by the court in reynolds. Counsel for all parties would be presumptively authorized to participate in proceedings concerning the privilege--at least one hearing would be required. The court would accord government officials and experts no deference at all on national security matters, thereby requiring judges to determine weighty matters of national security policy and classification. Further, in every case, whether or not the privilege is sustained, dismissal or summary judgment would be forbidden until the party against whom the privilege has been upheld "has had a full opportunity" to complete discovery and litigate the issue or claim to which the privileged material is relevant.[93] this would essentially overturn totten, forcing the government to admit highly classified secrets, such as the identities of spies, in the course of litigation. It would also force the government to submit to "broad-ranging discovery" that itself would be "disruptive of effective government," particularly national defense.[94] it is difficult to see how these changes could cut down on abuse or misuse of the state secrets privilege, because, as described above, none has been documented. It is clear, however, that the act would cause the government to lose more often on the privilege issue and to expend greater effort, and disclose more information, even when it is able to prevail. The effect would be particularly harsh in totten-style cases, in which the government would face the unattractive choice of being uncooperative and losing (by default or on summary judgment) or actually litigating, which would itself confirm the existence of secret relationships and programs. One would expect the government to settle most cases or lose on default judgment, and this strategy would encourage a flood of litigants, some of them with frivolous claims that the government could not challenge lest it disclose state secrets merely by doing do. This would not be, in any way, an improvement over current law--quite the opposite. The most significant effect, however, may be in activist lawsuits challenging government programs, which would be difficult or impossible to settle without shutting down large portions of our national security infrastructure. The only choice, then, would be to litigate, at considerable expense in terms of dollars and distraction. Because the government would lose more often--as a result of the act's heightened standard and inordinately complex procedural requirements--the courts would play a major role in making national security policy by disclosing details about, and effectively ending, programs that have been authorized by the president and congress. This would give activists a "heckler's veto" over many national security programs created by the democratic branches of government, to which such powers are textually committed in the constitution. This consequence is discussed further below. Finally, it is likely that the act's procedures would result in the inadvertent disclosure of closely held national security information. This too is discussed below. Far from being necessary, the sspa would endanger national security. It offers no apparent benefits, other than the possibility, attractive to some, that activists with unpopular ideas could use it to achieve an end-run around the democratic process on issues relating to national security. Ii. Serious constitutional concerns the sspa raises serious constitutional concerns by altering a privilege that has a constitutional dimension. Unlike most other privileges, which are supported solely by the common law or statutory law, the state secrets privilege is grounded in the powers committed to the president in article ii of the constitution. Congress's undisputed power to codify or even abrogate common-law privileges by statute cannot extend to altering to the constitution's assignments of authority and responsibility. Because it would radically restrict the authority of the president to safeguard military and diplomatic secrets and intelligence, the act is likely unconstitutional. As the supreme court explained in c & s airlines v. Waterman s.s. corp., courts simply lack the constitutional authority and the expertise to make certain types of decisions that are assigned to the executive: the president, both as commander-in-chief and as the nation's organ for foreign affairs, has available intelligence services whose reports neither are nor ought to be published to the world. It would be intolerable that courts, without the relevant information, should review and perhaps nullify actions of the executive taken on information properly held secret. Nor can courts sit in camera in order to be taken into executive confidences. But even if courts could require full disclosure, the very nature of executive decisions as to foreign policy is political, not judicial. Such decisions are wholly confided by our constitution to the political departments of the government, executive and legislative. They are delicate, complex, and involve large elements of prophecy. They are and should be undertaken only by those directly responsible to the people whose welfare they advance or imperil. They are decisions of a kind for which the judiciary has neither aptitude, facilities nor responsibility and have long been held to belong in the domain of political power not subject to judicial intrusion or inquiry.[95] this is not merely a prudential limitation on judicial power, but a bar to its exercise altogether. The courts both should not and "could not" second guess such decisions.[96] justice potter stewart provides a compelling explanation for the constitution's investiture of this narrow but absolute band of power in the executive, and concomitant narrow and absolute bar on judicial discretion: [i]t is elementary that the successful conduct of international diplomacy and the maintenance of an effective national defense require both confidentiality and secrecy. Other nations can hardly deal with this nation in an atmosphere of mutual trust unless they can be assured that their confidences will be kept. And within our own executive departments, the development of considered and intelligent international GMU Patriot Debate Institute 2013 57 File Title policies would be impossible if those charged with their formulation could not communicate with each other freely, frankly, and in confidence. In the area of basic national defense the frequent need for absolute secrecy is, of course, self-evident.[97] the court confirmed and elucidated the c & s airlines rule in u.s. v. Nixon, in which it rejected the president's claim of executive privilege.[98] nixon's assertion of the privilege fell short, explained the court, because "[h]e does not place his claim of privilege on the ground they [the materials sought] are military or diplomatic secrets."[99] "as to those areas of art. Ii duties," the opinion continues, the courts have "shown the utmost deference to presidential responsibilities."[100] put plainly, "to the extent this interest [a president's interest in confidentiality] relates to the effect discharge of a president's powers, it is constitutionally based."[101] in such cases, said the court, the rule in reynolds applies: "the court should not jeopardize the security which the privilege is meant to protect by insisting upon an examination of the evidence, even by the judge alone, in chambers."[102] the sspa seemingly ignores this clear jurisprudence and constitutional imperative, running roughshod over the separation of powers. Whereas reynolds required a court to determine only whether the executive had properly asserted the privilege--i.e., that it had complied with the requisite procedures and that the assertion concerned a matter assigned to the executive, as determined by the deferential "reasonable power" standard--the act would require courts to "determine whether the privilege claim is valid" by reviewing, for itself, all of the evidence asserted to be privileged and then determining "whether the harm identified by the government...is reasonably likely to occur should the privilege not be upheld."[103] in this inquiry, the court "shall weigh testimony from government experts in the same manner as it does, and along with, any other expert testimony," including that from other parties' experts or experts appointed by the court.[104] in this way, the act attempts to transfer a power clearly assigned to the executive to the courts. Under the act, even when a matter falls clearly within the executive's constitutional purview, and clearly outside of the judiciary's, the executive's assertion of the need for confidentiality would be afforded no deference at all, nullifying the executive's power to maintain secrecy in state affairs. This is directly contrary to c & s airlines, nixon, and dept. Of the navy v. Egan, in which the court explained that the president's "authority to classify and control access to information bearing on national security...flows primarily from this constitutional investment of power [art. Ii, § 2] in the president and exists quite apart from any explicit congressional grant."[105] because the state secrets privilege is raised only by the executive and only (rather axiomatically) in cases that the executive determines threaten to reveal state secrets, a determination which is assigned to the executive, the act would be "unconstitutional in all of its applications," easily satisfying the most stringent test for facial invalidity.[106] further, the sspa may also impermissibly intrude on the judicial authority conferred in article iii of the constitution. As the supreme court observed in city of boerne v. Flores, congress lacks "the power to establish the meaning of constitutional provisions."[107] this limitation incorporates the supreme court's constitutional precedents: when the court has interpreted the constitution, it has acted within the province of the judicial branch, which embraces the duty to say what the law is. When the political branches of the government act against the background of a judicial interpretation of the constitution already issued, it must be understood that in later cases and controversies the court will treat its precedents with the respect due them under settled principles, including stare decisis, and contrary expectations must be disappointed.[108] on this basis, the court struck down the religious freedom restoration act ("rfra") as an impermissible intrusion on its power to interpret the constitution, explaining "it is this court's precedent, not rfra, which must control."[109] the sspa is similar to rfra in that it purports to define the constitution. Specifically, it would impose a rule of decision on the courts requiring them to adopt a narrow construction of presidential power in cases where the state secrets privilege is asserted. But as in boerne, congress does not legislate on a blank slate. As discussed above, the court has held clearly and repeatedly that the state secrets privilege is grounded in article ii of the constitution. By ignoring this precedent, the sspa would usurp the power of the judicial branch "to say what the law is."[110] finally, several of the procedures specified in the act also impinge on the executive prerogative described in egan. First, the court may, at its discretion, order the executive to submit "all of the information that the government asserts is privileged" for review by the court.[111] second, the court may order the executive to produce "an adequate substitute [for protected information], such as a redacted version, summary of the information, or stipulation regarding the relevant facts, if the court deems such a substitute feasible."[112] third, the court may order the executive "to provide a manageable index of the information that the government asserts is subject to the privilege."[113] fourth, the court may order the executive to conduct a "prompt" review of any party or counsel to determine whether to provide that individual with a security clearance.[114] fifth, the court may require that protected information be disclosed to counsel at the hearings required by the act.[115] sixth, the court may order the executive to disclose protected information after it determines that the privilege claim is not "valid."[116] each of these procedures would, in some or all instances, violate the executive's constitutional authority "to classify and control access to information bearing on national security" and to "to determine whether an individual is sufficiently trustworthy to...give that person access to such information."[117] in short, the no fewer than seven provisions of the sspa, including its core operative provision, attempt to alter the constitutional separation of powers by reassigning powers from the executive to the judicial branch. In addition, the core provision may also impermissibly intrude the judicial power. Outside of the constitutional amendment process specified in article v of the constitution, congress lacks the power to affect such changes. Iii. Weakening congress and national security by altering the structural relationship between the branches, the sspa would also allow the courts to usurp congress's power and responsibility--a result that the most cynical members of congress may welcome for its political benefits. This, in turn, threatens to undermine the effectiveness of national security policy, putting americans at risk.the constitutional separation of powers is no mere legal nicety but an essential bulwark against both tyranny and impotence. The framers had experience with each of these ills, the former under british rule and the latter as citizens of states weakly bound by the articles of confederation. Thus they created an executive energetic in foreign affairs and national security but comparatively weak in domestic policy, recognizing that diplomacy and defense have aspects inimical to drawn-out deliberation, particularly in public. John jay described one such need in federalist no. 64:it seldom happens in the negotiation of treaties, of whatever nature, but that perfect secrecy and immediate despatch are sometimes requisite. These are cases where the most useful GMU Patriot Debate Institute 2013 58 File Title intelligence may be obtained, if the persons possessing it can be relieved from apprehensions of discovery. Those apprehensions will operate on those persons whether they are actuated by mercenary or friendly motives; and there doubtless are many of both descriptions, who would rely on the secrecy of the president, but who would not confide in that of the senate, and still less in that of a large popular assembly. Further, as alexander hamilton concluded in federalist no. 74, "of all the cares or concerns of government, the direction of war most peculiarly demands those qualities which distinguish the exercise of power by a single hand."thus, proposals which make exercise of this kind of executive power contingent on the approval of another branch sacrifice these advantages, as well as the accountability of the president for foreign affairs and national security. Not all matters relating to foreign entanglements and defense are, of course, strictly executive affairs. In many, congress plays an essential role in legislating programs that draw on its powers for the executive to carry out and in appropriating funds to these programs. And it is congress, of course, that is responsible for declaring war, defining the laws of war, and raising and supporting armed forces.[118] this raises a question: what is sacrificed when this legislative power and responsibility is transferred to another branch, in this case the judiciary? Perversely, that would be one of the consequences of the sspa. This is because the state secrets privilege enforces the separation of powers not just between the executive and the judiciary, but also between congress and the judiciary. By limiting judicial discretion in certain fields, it protects congressional policymaking in those fields. Broadly speaking, this is but one example of a textual commitment made to the legislative branch, the exercise of which should be and usually is met with the utmost judicial deference. In many instances, these powers are shared, in whole or in part depending on context, with the executive.[119] thus, the courts should not, and usually will not, adjudicate matters that are "political questions," a subset of the larger class of matters committed to the legislature, the executive, or both of the political branches. By impinging on the executive's ability to carry out programs that demand stealth and secrecy, the sspa (if not struck down as unconstitutional) would allow the courts to intrude on matters that would otherwise be outside of the powers committed to the judiciary. Courts would have the power to expose and effectively end or at least hinder all manner of intelligence and national security programs approved by congress that rely, in any measure, on stealth or secrecy. Even when the court ultimately rules that an assertion of the state secrets privilege was "valid," the damage of exposure will already have been done. In this way, the act would empower courts, and private parties bringing cases before them, to make policy that had previously been the exclusive domain of the political branches. This proposition is not far-fetched. As described above, many of the lawsuits in which the government asserts the state secrets privilege concern intelligence and national security programs, some of which have been specifically authorized by congress and some of which have proceeded under more general legislative authority with congress's acquiescence.[120] several of these lawsuits, launched and litigated by activist groups that have failed to convince congress to adopt their agendas, are intended to end or significantly restrict these programs. The act would facilitate these efforts, enabling activists to make an end-run around congress's legislative process.a totten-style case presents a simple example. Assume that the most recent intelligence authorization bill, passed by congress and signed by the president, permits the central intelligence agency to conduct human intelligence activities in foreign states. Assume, as well, that congress has also funded this program in its most recent appropriations bill. A single overseas agent or informant would be empowered, under the act, to extract "graymail" from the agency by threatening to reveal aspects of its human intelligence program through litigation.[121] the agency would face a choice: it could either pay (through a settlement or default judgment) and thereby make itself a target for identical threats from scores of sources and employees, or it could fight the lawsuit, effectively acknowledging aspects of its program, including the existence of an intelligence relationship. In either case, potential informants are likely to regard the cia with great wariness, for fear that their identities could be disclosed in litigation or by association with the disclosure of another. The human intelligence program, authorized and funded by congress and carried out by the executive, would be effectively shut down by judicial interference. As this simple hypothetical demonstrates, the direct consequences to national security of disclosing state secrets could be immense. But they are also straightforward and so need not be dwelled upon. Less obvious, but no less pernicious, are the indirect consequences. The benefit of congress's deliberative process, as concerns any number of intelligence and national security programs, would be undermined, as the courts upset carefully crafted balances hashed out in congressional committee and on the floor before being wrought into law. If such programs are to be ended or scaled back, it should be congress, which legislates over a far broader canvas than any court hearing a particular case, that should do it, relying on its understanding of the nation's needs and the appropriate means of satisfying them. The courts, considering the law case by case, simply lack the institutional expertise and resources to make policy. The result, in all likelihood, would be worse policy that does not strike the appropriate balance between national security, individual rights, expense, efficacy, and all the other factors that congress considers in writing legislation the other indirect effect, premised on cynicism, could do far more damage to congress and our representative democracy. In recent years, members of congress have been accused for their unwillingness to intervene in controversial actions carried out by the executive branch. Some of these activities, such as certain aspects of foreign intelligence collection, may be beyond congress's power to affect. Others, however, are not. This latter group includes the bush and obama administration's use of funds earmarked for financial institutions to bail out and then purchase general motors and chrysler; the federal reserve's bank bailouts; the aig bailout; the cia's use of "enhanced interrogation techniques" including waterboarding; surveillance programs that intercept some communications that are arguably domestic in nature; and the use of national security letters. In each case, congress held multiple hearings and many members of congress expressed their criticism, often in harsh, accusatory tones. In none, however, did congress pass legislation significantly curtailing the executive's discretion or rescinding the statutory authority upon which the executive relied. The sspa takes this cynicism to a new level. It would allow congress to duck tough decisions in the national security arena--where bad decisions can have catastrophic consequences-by passing the buck to the courts. These are the same courts that have already come under criticism from the majority party in congress for upholding state secrets claims and thereby declining to invalidate programs that congress itself could eliminate with a single bill. The act would take the pressure off of congress to check executive overreaching, while giving members still more targets to criticize in GMU Patriot Debate Institute 2013 59 File Title overheated floor statements. This result, pushing contentious matters out of the realm of debate, would be politically safe--which no doubt explains its attraction to some members--but absolutely poisonous to the american politic. Rather than attempt to alter the constitutional separation of powers so as to evade responsibility for government actions and omissions, congress should confront these issues directly and forthrightly. Iv. The greater public good "dismissal is a harsh sanction," the fifth circuit observed in one state secrets case. "but the results are harsh in either direction and the state secret doctrine finds the greater public good--ultimately the less harsh remedy--to be dismissal."[122] congress should not sacrifice this greater good to ameliorate the unfortunate plight of the very few who suffer a harsh remedy under the law. The sspa would have that effect, putting the nation and its citizens at risk to aid the undemocratic efforts of activists who have been unable to sway congress to adopt their risky policies. The act, however, offers an indirect approach--shifting controversial and contentious issues to the courts--thereby promising to shield congress from deserved opprobrium for allowing our nation's security to be placed at risk. This legislation is cynical. It is also unconstitutional and completely unnecessary to remedy any genuine ill. Congress should look past the parochial interests of those who would use the courts to make policy, as well as political expediency, and focus on the greater public good. GMU Patriot Debate Institute 2013 60 File Title Wiretapping Bad – Privacy Lewis, gordon mckay professor of computer science in the school of engineering and applied sciences at harvard university, 10-08-08 (harry, “how far can government go to track your private messages”, 10-08-08, lexisnexus) We use e-mail for everything from business negotiations to quick i-love-yous. Because e-mail resembles a telephone conversation, we too often assume it's private. It's not. Just ask sarah palin. A college student recently broke into her yahoo e-mail account with frightening ease; he boasted that it took just 45 minutes using wikipedia and google to find the answers to yahoo's security questions about her birth date, zip code and where she met her husband. But break-ins are hardly the only threat to our e-mail privacy.who can see your e-mail ? Even en route ? Is a complicated question, made more uncertain by a recent court decision. First, your office e-mail is governed by whatever rules your company decides. For example, harvard university, where i work, states that e-mail "may be accessed at any time by management or by other authorized personnel for any business purpose." businesses need to be able to investigate fraud, but such sweeping authorizations create opportunities for abuse. What about government searches? Let's start with the easy case. If you go to china and e-mail or instant message from your hotel room, the chinese government may read your content. It's scanned for "security" purposes ? The government is looking for discussions of tibetan independence, perhaps. You may never notice anything, or you may mysteriously lose your internet connection. It recently came out that china monitors and censors text messages among skype users ? A canadian research group uncovered more than 166,000 censored messages. Could such surveillance happen in the united states? The fourth amendment states: "the right of the people to be secure in their persons, houses, papers and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause."you might think that means the government can't clandestinely search your e-mail, but it doesn't. You may not even know suppose you use gmail or yahoo! Mail. If the government wants to see your e-mail, it can have the warrant served on that company. Of course, the service provider has to respond to the warrant, just as you would if the feds came to your house. The difference is that the company decides whether to resist the court order, not you. You are supposed to be informed within 90 days, but in practice you may never know. E-mail stored elsewhere really isn't yours. In 2005, the new york times exposed a program of "warrantless wiretapping" of communications, including e-mail between individuals in the united states and foreign countries. Congress codified the legality of some such searches in 2007 and again this summer. In a word, the rules change when "terrorism" is invoked as a justification. If the government demands your e-mail using a national security letter, your service provider is prohibited from telling you. Searching e-mail as it crosses the u.s. Border is perhaps analogous to inspecting a laptop carried into the united states. Customs officials can inspect (and confiscate) your possessions; arguably they should also be able to search your email ? Though under antiterrorism legislation, the eavesdropping can happen without your knowledge. Non-terror-related snooping what about purely domestic e-mail surveillance without a warrant? The terrorist surveillance program processes domestic e-mail in cooperation with internet service providers; the electronic frontier foundation has taken the government to court. But eavesdropping occurs even for non-terror-related crimes. As part of the investigation of one steven warshak, yahoo turned over his e-mail to federal agents, who had not gotten a warrant. A lower court threw out the evidence, but on july 11, a federal appeals court allowed it to stand. The court didn't say that there was no constitutional issue, only that the case had enough other complexities that a fourth amendment ruling about e-mail would be premature. A minority of the court was not satisfied with that technical dodge, and stated in its blistering opinion, "heaven forbid that we should intrude on the government's investigatory province and actually require it to abide by the mandates of the bill of rights. I can only imagine what our founding fathers would think of this decision. If i were to tell james otis and john adams that a citizen's private correspondence is now potentially subject to unannounced searches by the government without a warrant supported by probable cause, what would they say? Probably nothing, they would be left speechless."so as of today, we don't know whether the government can search your e-mail without a warrant, as happens routinely in china. My advice? Be careful putting secrets in e-mail. Use encryption software, some of which is free. And urge congress to act on e-mail privacy. Harry lewis is a professor of computer science at harvard university and fellow of the berkman center for internet and society. With hal abelson and ken ledeen, he is coauthor of "blown to bits: your life, liberty, and happiness after the digital explosion." GMU Patriot Debate Institute 2013 Wiretapping Bad – Privacy Diffie and Landau, consulting professor at CISAC and Senior Staff Privacy Analyst at Google, 2009 (Whitfield and Susan, “Communications Surveillance: Privacy and Security at Risk”, 06-30-14, EBSCOHOST, NV) In 2005 the New York Times revealed that the U.S. government had been wiretapping communications to and from the U.S. without a warrant. After the passage of FISA, NSA (National Security Agency), America’s foreign-intelligence eavesdroppers, had been forbidden to listen in on radio communications inside the U.S. without a warrant unless at least one end of the communication was outside the country and the internal end was not a targeted “U.S. person.” Interception of purely domestic communications within the country always required a warrant. As more messages came to travel by fiber-optic cable and fewer by radio, NSA was forced to turn to other, not necessarily legal, approaches. Curiously, the greatest threat to privacy may not be snooping on people but snooping on things. We are moving from a world with a billion people connected to the Internet to one in which 10 or 100 times that many devices will be connected as well. These range from the much-discussed smart refrigerator that knows when it is time to order more milk to RFID (radio-frequency identification) tags in products that enable the tracking of where the goods are located before, and perhaps after, retail sale. Particularly in aggregation, the information reported by these devices will blanket the world with a network whose gaze is difficult to evade. The future of privacy will depend on a combination of legal and technical measures by which device-to-device communications are protected. It is not just privacy that is at risk under the new regime, it is security as well. National security is much broader than simply enabling intelligence and law-enforcement investigations. Although undertaken in the name of national security, building wiretapping into our telecommunications system may be a greater threat to that security than the spies and terrorists against whom it is aimed. First and foremost, information security means protecting public and private computing and communications systems against attacks from both inside and outside. It was the need for that type of protection that caused the European Union in 1999 and the U.S. government in 2000 to relax their export controls on strong cryptography, a change that bolstered the security of Internet communications. A network may be designed to provide security to its individual users against everything except authorized intrusions by the network itself, a plausible goal for a DoD (Department of Defense) network. Such a model requires centralization of authority that is possible for DoD, and might have PRIVACY been possible for the Internet in 1985—when it was a U.S. project—but is not feasible now. The Internet has become essential to modern life. Business and personal communications—and even critical infrastructure—rely upon the network to function. Yet the combination of attacks on the network and on network hosts means that we are increasingly reliant upon an unreliable network. 61 File Title GMU Patriot Debate Institute 2013 62 File Title Wiretapping Bad – Privacy Wu, professor at Columbia Law School, senior advisor to Federal Trade Commision, 2013 (Tim, “Wiretapping the Web”, 6-30-14, The New Yorker, JMM) “While it is easy to dislike government surveillance in the abstract, the case for tapping becomes extremely strong when facing the actual investigation of a serious crime, like a murder, a planned terrorist attack, or a powerful criminal organization” GMU Patriot Debate Institute 2013 63 File Title Wiretapping Bad – Freedom Allowing wiretapping in one instance opens a floodgate of governmental surveillance Schubert 10, Joseph Schubert Yahoo! Contributor Network “Public Surveillance Pros and Cons” Dec-6-2010 http://voices.yahoo.com/public-surveillance-pros-cons-7284444.html DOA 7-1-13 SH The "slippery slope" effect is what we need to watch out for. When the citizens under watch are completely desensitized to their lack of security caused by the public surveillance, it will be easier for the government to take even more of the freedom and privacy from its people. This is even more likely if the surveillance camera networks in London become more successful in tracking and preventing crime. Cities all over the world will look to it as an example and officials will want to put their own systems in place, using London's successful drop in crime to gain support of voters and government. London has an extreme case of surveillance, as well as all of Britain with its 4.2 million CCTV cameras, but it is one of the growing number of cities with these networks put into place and operating. We cannot be sure what stance the world will take on public surveillance in the future, but we can already see that it is met with some resistance and some invitation. We know that we need to be cautious when our privacy and rights are concerned, and we know that we need to be weary when giving our governments more power over them. Privacy and security are two separate ideas that have gone hand in hand, but in this age of rapid advance in technology and information, the two seem to be in a tug-of-war with one another. With cameras lurking, the government monitoring phone calls and email messages, and laws changing to accommodate these acts, we can hardly assume we have any privacy when we leave our homes when we are far from guaranteed privacy within them. Bruce Schneier, security technologist and author writes, "We've been told we have to trade off security and privacy so often ... that most of us don't even question the fundamental dichotomy. But it's a false one" (Security vs. Privacy) Schneier mentions the terrorist attacks on 9/11/01, an event like many others that has lead to the fear many people hold about their safety and security, and may be a headlining cause to why many American citizens would sacrifice their privacy for the feeling of security promised by the government wanting more power to watch its people closer. We are not guaranteed privacy in this country, though many states have laws in place to control and place limits on surveillances such as audio and video recording. GMU Patriot Debate Institute 2013 64 File Title Wiretapping Bad – Foreign Relations – EU Wiretapping undermine relations with EU Levs & Schoichet 13 Josh Levs and Catherine E. Shoichet are CNN Correspondent, “Europe furious, ‘shocked’ by report of U.S. Spying,” 7-1-13, CNN, http://www.cnn.com/2013/06/30/world/europe/eu-nsa/index.html, DOA: 7-1-13, PK European officials reacted with fury Sunday to a report that the U.S. National Security Agency spied on EU offices. The European Union warned that if the report is accurate, it will have tremendous repercussions. "I am deeply worried and shocked about the allegations," European Parliament President Martin Schulz said in a statement. "If the allegations prove to be true, it would be an extremely serious matter which will have a severe impact on EU-US relations. On behalf of the European Parliament, I demand full clarification and require further information speedily from the U.S. authorities with regard to these allegations." Bush on Snowden: He damaged the country Still looking for Edward Snowden Deal offered for Snowden's return Obama covers his bases on Snowden German Justice Minister Sabine Leutheusser-Schnarrenberger "said if the accusations were true, it was reminiscent of the Cold War," ministry spokesman Anders Mertzlufft said, adding that the minister "has asked for an immediate explanation from the United States." French Foreign Minister Laurent Fabius called for a swift explanation from American authorities. "These acts, if they are confirmed, would be absolutely unacceptable," he said in a statement. The outrage from European officials over the weekend was the latest fallout since Edward Snowden, a former National Security Agency computer contractor, started spilling details of U.S. surveillance programs to reporters earlier this month. Citing information from secret documents obtained by Snowden, the German news magazine Der Spiegel reported Sunday that several U.S. spying operations targeted European Union leaders. Der Spiegel said it had "in part seen" documents from Snowden that describe how the National Security Agency bugged EU officials' Washington and New York offices and conducted an "electronic eavesdropping operation" that tapped into a EU building in Brussels, Belgium. The magazine's report also says that NSA spying has targeted telephone and Internet connection data in Germany more than any other European nation. An average of up to 20 million phone connections and 10 million Internet data connections are surveyed daily, Der Spiegel said, noting that the intensity of surveillance puts the U.S. ally on par with China, Iraq and Saudi Arabia. Another report Sunday claimed that surveillance extended beyond European offices. The Guardian newspaper reported that one NSA document leaked by Snowden describes 38 embassies and missions as "targets" and details surveillance methods that include planting bugs in communications equipment and collecting transmissions with specialized antennae. Targets included France, Italy, Greece, Japan, Mexico, South Korea, India and Turkey, according to The Guardian. CNN has not independently confirmed the allegations in the reports from Der Spiegel and the Guardian. U.S. officials did not immediately respond to the Guardian's report. The Office of the Director of National Intelligence declined to comment Sunday on specific allegations published in Der Spiegel. "The United States government will respond appropriately to the European Union through our diplomatic channels, and through the EU/U.S. experts' dialogue on intelligence that the U.S. proposed several weeks ago," the office said in a statement. "We will also discuss these issues bilaterally with EU member states. While we are not going to comment publicly on specific alleged intelligence activities, as a matter of policy, we have made clear that the United States gathers foreign intelligence of the type gathered by all nations." Ben Rhodes, White House deputy national security adviser for strategic communications, said he had not seen the report and "would not comment on unauthorized disclosures of intelligence programs. The intelligence community would be the most appropriate to do that." Rhodes added that "those are some of our closest intelligence partners, so it's worth noting that the Europeans work very closely with us. We have very close intelligence relationships with them." Father proposes deal for Snowden's voluntary return U.S. asks Ecuador to reject any asylum request from Snowden Michael Hayden, a former director of the NSA and CIA, told "Face the Nation" on CBS on Sunday morning that he didn't know whether the report was true. "I've been out of government for about five years, so I really don't know, and even if I did, I wouldn't confirm or deny it," he said. "But I think I can confirm a few things for you here this morning. Number one, the United States does conduct espionage. Number two, our Fourth Amendment, which protects Americans' privacy, is not an international treaty. And number three, any European who wants to go out and rend their garments with regard to international espionage should look first and find out what their governments are doing." GMU Patriot Debate Institute 2013 65 File Title European Union spokeswoman Marlene Holzner, in a e-mail to CNN, said, "We have immediately been in contact with the U.S. authorities in Washington D.C. and in Brussels and have confronted them with the press reports. They have told us they are checking on the accuracy of the information released yesterday and will come back to us." In Brussels, Der Spiegel says, the agency targeted the Justus Lipsius Building, which houses the European Council and the EU Council of Ministers, the union's main decision-making and legislative body. And in Washington, the magazine report claims, the NSA installed bugs in the European Union's building and infiltrated its computer network. Der Spiegel's report comes as negotiations for a trans-Atlantic trade agreement between the United States and the European Union are set to start next month in Washington. Obama: Pay no attention to that man we can't capture Snowden has revealed himself as the source of documents outlining a massive effort by the NSA to track cell phone calls and monitor the e-mail and Internet traffic of virtually all Americans. Critics slam him as a traitor. Supporters hail him as a hero. Now Snowden, who faces espionage charges in the United States, is in Russia and seeking asylum from Ecuador. U.S. Vice President Joe Biden asked Ecuador "to please reject" the request for asylum, according to Ecuadorian President Rafael Correa. "That's not acceptable," WikiLeaks founder Julian Assange told ABC's "This Week" on Sunday. Assange, whose organization facilitates the release of classified documents and is assisting Snowden's asylum bid, said he couldn't reveal details about the former NSA contractor's specific location or the status of his case. He criticized U.S. officials for pressuring Ecuador on the matter. "Asylum is a right that we all have. It's an international right. The United States has been founded largely on accepting political refugees from other countries and has prospered by it. Mr. Snowden has that right," said Assange. "Ideally, he should be able to return to the United States. Unfortunately, that's not the world that we live in and hopefully another country will give him the justice that he deserves." Former Cuban leader Fidel Castro weighed in on Sunday. In a letter to Nicaraguan President Daniel Ortega published in Cuban state media, Castro praised Ecuador's president for standing up to U.S. threats over Snowden. On Saturday night, Correa said the ball was in Russia's court. "We didn't ask to be in this situation. Mr. Snowden has been in touch with Mr. Assange, who recommended he ask for asylum in Ecuador. In order to process this request, he needs to be in Ecuadorian territory," Correa said in an interview with Ecuador's Oromar TV on Saturday night. "At this point, the solution for Snowden's final destination is in the hands of the Russian authorities." Russian President Vladimir Putin has said it's up to Snowden to figure out his next step. "The sooner he selects his final destination point, the better both for us and for himself," Putin said. A top Russian lawmaker said Sunday that Russia must not hand Snowden over to the United States. "It's not a matter of Snowden's usefulness to Russia, it's a matter of principle," Alexei Pushkov -- who heads the international affairs committee at the Duma, the lower house of parliament -- said on Twitter. "He is a political refugee and handing him over is morally unacceptable," he said. GMU Patriot Debate Institute 2013 66 File Title Wiretapping Bad – Foreign Relations – Germany Germany opposes wiretapping Traynor 13 Ian Traynor, Ian Traynor is the Guardian's European editor. He is based in Brussels, “NSA spying row: bugging friends is unacceptable, warn Germans” 7-1-13, theguardian, http://www.guardian.co.uk/world/2013/jul/01/nsa-spying-allegations-germany-usfrance, DOA: 7-1-13, PK Martin Schulz, the president of the European parliament, likened the NSA to the Soviet-era KGB and indirectly suggested a delay in the talks. Greens in the European parliament, as well as in France and Germany, called for the conference to be postponed pending an investigation of the allegations. They also called for the freezing of other data-sharing deals between the EU and the US, on air transport passengers and banking transactions, for example, and called for the NSA whistleblower, Edward Snowden, to be granted political asylum in Europe. French Greens asked Hollande to grant Snowden asylum in France.