Racial, Ethnic, and Religious Surveillance Aff Plans Plan – Policy The United States Federal Judiciary should rule that domestic surveillance on the basis of race, religion, and ethnicity are unconstitional. Plan solves. Unegbu, Howard University JD candidate, 2013 [Cindy, 57 How. L.J. 433, “NOTE AND COMMENT: National Security Surveillance on the Basis of Race, Ethnicity, and Religion: A Constitutional Misstep” Lexis, accessed 7-6-15, TAP] The grant of surveillance power to monitor individuals without suspicion of criminal or terrorist activity and the ability to collect personal information from various sources on the basis of race or ethnicity has resulted in the discrimination of domestic individuals who belong to a particular racial or ethnic group. This discrimination is generated through a disparate impact that the new government surveillance authority has on various ethnic and religious groups, specifically those that are Arab, South Asian, or practitioners of the Islamic religion. Through a balancing test of five factors established through Supreme Court jurisprudence, it is apparent that there is sufficient indirect evidence of the government's intent to discriminate. Because there is an established intent to discriminate, the new government surveillance authority and procedures can only be constitutionally upheld if the acts are narrowly tailored to a compelling government interest. The compelling state interest is satisfied through the goal of nationally security; however, the narrowly tailored prong fails because of the monitoring system's over-inclusiveness. Therefore, the government national security surveillance authority and procedures, via the NCTC amendments and DIOG guidelines, are in violation of the Fourteenth Amendment's Equal Protection Clause. Plan – K The United States Federal Government should end domestic surveillance on the basis of race, religion, and ethnicity. Plan solves. Unegbu, Howard University JD candidate, 2013 [Cindy, 57 How. L.J. 433, “NOTE AND COMMENT: National Security Surveillance on the Basis of Race, Ethnicity, and Religion: A Constitutional Misstep” Lexis, accessed 7-6-15, TAP] The grant of surveillance power to monitor individuals without suspicion of criminal or terrorist activity and the ability to collect personal information from various sources on the basis of race or ethnicity has resulted in the discrimination of domestic individuals who belong to a particular racial or ethnic group. This discrimination is generated through a disparate impact that the new government surveillance authority has on various ethnic and religious groups, specifically those that are Arab, South Asian, or practitioners of the Islamic religion. Through a balancing test of five factors established through Supreme Court jurisprudence, it is apparent that there is sufficient indirect evidence of the government's intent to discriminate. Because there is an established intent to discriminate, the new government surveillance authority and procedures can only be constitutionally upheld if the acts are narrowly tailored to a compelling government interest. The compelling state interest is satisfied through the goal of nationally security; however, the narrowly tailored prong fails because of the monitoring system's over-inclusiveness. Therefore, the government national security surveillance authority and procedures, via the NCTC amendments and DIOG guidelines, are in violation of the Fourteenth Amendment's Equal Protection Clause. Policy 1ac Terror Adv Voluntary informants won’t come forward now – FBI surveillance of Muslim communities undermines involvement. Reversing that is critical to stop terrorism. Stabile, University of California Berkeley School of Law JD, 2014 [Emily, 102 Calif. L. Rev. 235, “COMMENT: Recruiting Terrorism Informants: The Problems with Immigration Incentives and the S-6 Visa” Lexis, accessed 7-12-15, TAP] Moreover, Professor David A. Harris claims that "the unregulated use of informants in mosques and other religious and cultural settings can also do great damage because it poses the risk of cutting off our best possible source of intelligence: the voluntary, cooperative relationships that have developed between law enforcement and Muslim communities." 102Link to the text of the note Having community members report suspicious information to the FBI may be a more effective way of obtaining reliable terrorism intelligence from these communities. 103Link to the text of the note For example, in the few domestic terrorist prosecutions where a terrorist attack plan actually existed prior to informant involvement, community members who had noticed something amiss were the first to alert the FBI and identify the subjects. 104Link to the text of the note In fact, since 9/11, community members have assisted law enforcement in stopping potential terrorism plots in a number of cases. 105Link to the text of the note A [252] recent example, the case of Umar Farouk Abdulmutallab, the "Underwear Bomber," shows that the attempted bombing could have been prevented had law enforcement heeded the warnings that Abdulmutallab's father gave the CIA at the U.S. embassy in Nigeria. 106Link to the text of the note As the president of the San Francisco Board of Supervisors and former criminal prosecutor, David Chiu testified regarding the Arab, Middle Eastern, Muslim, and South Asian communities in San Francisco: "Without that level of cooperation, that level of trust, everything falls apart … . Surveillance only serves to continue to drive wedges when cooperation is what is needed most." 107Link to the text of the note FBI surveillance fails now – it produces a massive chilling effect and alienates Muslim communities inside the United States. Stabile, University of California Berkeley School of Law JD, 2014 [Emily, 102 Calif. L. Rev. 235, “COMMENT: Recruiting Terrorism Informants: The Problems with Immigration Incentives and the S-6 Visa” Lexis, accessed 7-12-15, TAP] In the past, the FBI's Domestic Investigations and Operations Guide ("DIOG"), which provides guidance on implementing the Attorney General's Guidelines, allowed supervisory agents to delegate to inferior agents decisions concerning the surveillance of mosques and other religious gathering places. 72Link to the text of the note Recently, however, restrictions have been slightly strengthened by requiring agents in charge of the field operations to approve surveillance. 73Link to the text of the note Nevertheless, this change may not really improve matters, as numerous instances of mosque surveillance have already eroded Muslim communities' trust of law enforcement. 74Link to the text of the note By placing informants in places of worship and cultural spaces, the FBI has chilled free speech and damaged the most reliable way of obtaining accurate terrorism intelligence from these communities. In a well-publicized and egregious case, an FBI informant named Craig Monteilh was assigned to surveil a mosque in Irvine, California. 75Link to the text of the note The FBI instructed Monteilh, a convicted felon working as a paid informant, 76Link to the text of the note to [248] indiscriminately surveil worshippers at the mosque, without concentrating on a particular target or activity. 77Link to the text of the note After congregants noticed Monteilh's inflammatory rhetoric and repeated talks about instigating terrorism, they reported him to the FBI. 78Link to the text of the note The FBI failed to investigate further, and after the arrest of another suspected terrorist, Monteilh revealed his identity as an FBI informant. 79Link to the text of the note This incensed the Islamic community, in part because an FBI Assistant Director had promised a year earlier that the agency would not surveil mosques. 80Link to the text of the note In response, Islamic groups like the Council on American-Islamic Relations and the American Muslim Task Force on Civil Rights and Elections, which had previously cooperated with the FBI and urged community members to do the same, reversed course and stopped their outreach efforts to aid law enforcement. 81Link to the text of the note In the end, Craig Monteilh's story is just one of many that demonstrate why Muslim communities have soured on helping the FBI locate suspicious people within their communities. 82Link to the text of the note Although Monteilh was neither an immigrant nor was offered immigration incentives in return for intelligence, his story shows how the use of informants can potentially damage both law enforcement and immigrant communities. Monteilh's story also illustrates why many communities feel mosque surveillance infringes on their freedom of speech. Once a community becomes aware that FBI informants may be surveilling its mosques, the fear that informants will target them chills the free exchange and expression of ideas and speech. 83Link to the text of the note Given the constitutional guarantees of the First Amendment, places of worship should be treated with utmost sensitivity by law enforcement, 84Link to the text of the note as the self-editing that occurs when people know they are being watched curtails the free exchange of ideas. The very knowledge of potential surveillance may caution people against discussing their political and religious viewpoints for fear of being targeted by informants like Monteilh. Consequently, mosque attendance falls 85Link to the text of the note and community cohesion suffers, thwarting the First Amendment's protection of free expression. Even those not harboring extreme viewpoints may be [249] dissuaded from political speech for fear of misinterpretation. For example, after revelations of potential FBI surveillance surfaced at the Islamic Center of Irvine, congregant Omar Turbi attested, "It gives you a little bit of apprehension about who you trust … . Makes you think twice about what you say; what if people misunderstand you?" 86Link to the text of the note Similarly, the executive director of the Council on American-Islamic Relations in Anaheim stated, "Some average Muslims interested only in praying are avoiding mosques for fear of somehow being monitored or profiled … . Everybody is afraid, and it is leading to an infringement of the free practice of our religion." 87Link to the text of the note Although some states like Indiana, Pennsylvania, and Oregon have enacted laws prohibiting the surveillance of religious sites without reasonable suspicion, 88Link to the text of the note it should not be necessary to rely on state laws to protect the integrity and values of the First Amendment. B. Mosque Surveillance Encourages Religious and Ethnic Profiling In addition to eroding the First Amendment's free speech rights of Muslims and Middle Easterners, the FBI's informant surveillance tactics also inappropriately target these religious and ethnic groups. Most of the organizations designated as Foreign Terrorist Organizations by the State Department are Muslim or Arab groups. 89Link to the text of the note Many post-9/11 policies, like the extensive detention of Muslims and Middle Easterners, indicate that the federal government views Muslims and Middle Eastern immigrants as potential terrorists. 90Link to the text of the note Popular perception of Muslims has moved in the same direction, with huge opposition, for example, to the construction of an Islamic community center - Park 51 - near the site of the World Trade Center in New York. 91Link to the text of the note Other examples include state laws banning the use of Shari'ah law in judicial decisions 92Link to the text of the note and Islamophobia 93Link to the text of the note rising in the United States 94Link to the text of the note and abroad. 95Link to the text of the note [250] By sending immigrant informants into mosques and religious and ethnic communities with little more than a vague directive to find terrorists, the FBI perpetuates ethnic profiling and the conflation of Islam and terrorism. In recruiting terrorism informants from the immigrant population, the FBI puts an ethnic and religious face on terrorism, and perpetuates the popular perception of what terrorists look like. Sending these informants into mosques and immigrant communities greatly increases the chances that alleged suspects fit the ethnic and religious stereotypes of terrorists. Put differently, if an informant is assigned to surveil a mosque, the chances of the informant bringing back a non-Muslim or non-Middle Eastern suspect are low. This surveillance policy becomes a vicious cycle. The FBI recruits immigrant individuals from suspect communities to become informants, pressures them into producing terrorism suspects that fit the popular perception of what terrorists are like, and then prosecutes these suspected terrorists. All this reinforces the public conflation of immigrants, Muslims, Middle Easterners, and terrorists. Ethnic and religious profiling further alienates Muslim and Middle Eastern communities, and deepens their mistrust for government. 96Link to the text of the note Additionally, by predisposing many Americans to view Muslims, immigrants, and Middle Easterners as potential terrorist threats, ethnic and religious profiling may also bias juries in terrorism prosecutions. 97Link to the text of the note Although suspects often claim entrapment as a defense, after 9/11 the entrapment defense has never been successfully used in terrorism cases. 98Link to the text of the note In fact, many, if not most, terrorism cases never reach the jury because the chances of successfully defending against terrorism charges after 9/11 are almost nonexistent. 99Link to the text of the note Popular stereotypes concerning Muslims and Middle Easterners play a role in this. Although the use of immigration law in recruiting informants is only one of many factors contributing to this harmful cycle, the use of coercive tactics like immigration law to recruit informants creates a [251] higher risk of unfounded terrorism prosecutions against innocent individuals who do not pose a risk. Consequently, this fuels the public perception that a stereotypical terrorist is a Middle Easterner or Muslim. FBI surveillance of racial, ethnic, and religious minorities creates a chilling effect – it undermines the legitimacy of informant cooperation programs, trades off with resources for countering terrorism, and produces false intelligence. Stabile, University of California Berkeley School of Law JD, 2014 [Emily, 102 Calif. L. Rev. 235, “COMMENT: Recruiting Terrorism Informants: The Problems with Immigration Incentives and the S-6 Visa” Lexis, accessed 7-12-15, TAP] The FBI's use of immigration rewards and threats to recruit informants undermines civil liberties and cooperation with Muslim, Middle Eastern, and other immigrant communities. 67Link to the text of the note In general, the presence of informants in mosques and the surrounding community creates suspicion and distrust of law enforcement efforts, chilling free speech. That is, when community members know that informants are potentially monitoring their speech, community members are less likely to cooperate with law enforcement efforts. Furthermore, by sending informants into Muslim and Middle Eastern communities without specific targets to surveil, the FBI encourages ethnic and religious profiling and helps conflate Islam and terrorism in the public eye. Because informants recruited via immigration law possess less bargaining power and face potentially more serious consequences than those recruited via criminal law incentives, there is greater incentive for these informants to supply false information and accuse innocent individuals. Ethnic and religious profiling, combined with the indiscriminate surveillance carried out by informants, can entrap individuals who do not pose a threat. Entrapment wastes government resources and undermines public confidence in the justice system and law enforcement. Although the FBI's problematic surveillance of Muslim and Middle Eastern communities stems from the use of all types of informants and not merely those recruited with immigration promises, a modification to the use of immigration law in rewarding or coercing terrorism informants would provide a step toward producing more useful intelligence and reducing the risk of harm to innocent individuals. Perception of government accountability is critical to effective informants – limiting arbitrary surveillance is critical to the perception of legitimacy of surveillance programs. Stabile, University of California Berkeley School of Law JD, 2014 [Emily, 102 Calif. L. Rev. 235, “COMMENT: Recruiting Terrorism Informants: The Problems with Immigration Incentives and the S-6 Visa” Lexis, accessed 7-12-15, TAP] [245] Third, while false and inaccurate intelligence has generally been a problem with informants, 58Link to the text of the note recent terrorism investigations raise the question of whether the alleged terrorist crimes would have occurred without law enforcement instigating the terrorist activities. 59Link to the text of the note Informants in these cases aggressively instigated the defendants' participation in the plot. 60Link to the text of the note Recruiting informants who lack ties to terrorist organizations may be at the root of this problem, because they lack predetermined targets known to be involved in terrorist groups. 61Link to the text of the note Without these targets, informants under pressure to avoid deportation or other immigration consequences, for example, are more likely to produce false information. 62Link to the text of the note Further complicating this issue, the government has suffered from credibility problems in terrorism investigations for not always fulfilling the promises made to informants. 63Link to the text of the note One FBI informant, a Yemeni citizen named Mohamed Alanssi, set himself on fire in front of the White House after alleging that the FBI had broken numerous promises to him. 64Link to the text of the note Governmental credibility is critical to maintaining a relationship of trust between law enforcement and informants, and thereby facilitates the gathering of credible intelligence. Due to the vast number of terrorism informants today, the secrecy underlying the investigations, 65Link to the text of the note and the potential for false intelligence, the recruitment and use of informants in terrorism investigations present unique problems to the FBI. Because of increased confidentiality surrounding national security issues, the government has the means and incentives to shield the true extent of its recruitment and use of terrorism informants from courts and the public. 66Link to the text of the note To increase accountability and lessen the risk of abuse, more oversight over the FBI's dealings with terrorism informants is needed. Notably, some limits on the FBI's use of informants do exist. However, given the secrecy [246] surrounding national security concerns, whether these limits apply in terrorism investigations remains unclear. Rebuilding trust between Muslim communities and law enforcement is critical – curtailing surveillance is key to law enforcement credibility. Stabile, University of California Berkeley School of Law JD, 2014 [Emily, 102 Calif. L. Rev. 235, “COMMENT: Recruiting Terrorism Informants: The Problems with Immigration Incentives and the S-6 Visa” Lexis, accessed 7-12-15, TAP] In order to procure accurate intelligence from any community, a relationship of trust and respect between law enforcement and the community must exist. 116Link to the text of the note However, from the mass arrest and detention of Muslims shortly after 9/11 117Link to the text of the note to the ongoing allegations of ethnic and religious profiling today, 118Link to the text of the note the federal government has made serious errors in dealing with Muslim and Middle Eastern communities since 9/11. While the government recognizes that community policing 119Link to the text of the note is the best way to obtain reliable intelligence, 120Link to the text of the note the FBI is caught between two contradictory strategies and must choose between sending informants into mosques without reasonable suspicion, and gaining the trust and cooperation of Muslim and Middle Eastern communities. As one congregant in a surveilled mosque observed, "The FBI wants to treat the Muslim community as a partner while investigating us behind our backs … . They can't have it both ways." 121Link to the text of the note While it is unrealistic to think that the FBI will stop using informants in these communities, a more restrained use of informants based on reasonable suspicion of wrongdoing would mitigate perceived damages to community relations. Requiring the FBI to have preexisting reasonable suspicion would add credibility to the agency and alleviate some of the fear surrounding terrorism investigations involving informants. Nuclear terrorism triggers extinction. Dvorkin, Major General (retired), 12 (Vladimir, doctor of technical sciences, professor, and senior fellow at the Center for International Security of the Institute of World Economy and International Relations of the Russian Academy of Sciences. The Center participates in the working group of the U.S.-Russia Initiative to Prevent Nuclear Terrorism, 9/21/12, "What Can Destroy Strategic Stability: Nuclear Terrorism is a Real Threat," belfercenter.ksg.harvard.edu/publication/22333/what_can_destroy_strategic_stability.html] Hundreds of scientific papers and reports have been published on nuclear terrorism. International conferences have been held on this threat with participation of Russian organizations, including IMEMO and the Institute of U.S. and Canadian Studies. Recommendations on how to combat the threat have been issued by the International Luxembourg Forum on Preventing Nuclear Catastrophe, Pugwash Conferences on Science and World Affairs, Russian-American Elbe Group, and other organizations. The UN General Assembly adopted the International Convention for the Suppression of Acts of Nuclear Terrorism in 2005 and cooperation among intelligence services of leading states in this sphere is developing.¶ At the same time, these efforts fall short for a number of reasons, partly because various acts of nuclear terrorism are possible. Dispersal of radioactive material by detonation of conventional explosives (“dirty bombs”) is a method that is most accessible for terrorists. With the wide spread of radioactive sources, raw materials for such attacks have become much more accessible than weapons-useable nuclear material or nuclear weapons. The use of “dirty bombs” will not cause many immediate casualties, but it will result into long-term radioactive contamination, contributing to the spread of panic and socio-economic destabilization.¶ Severe consequences can be caused by sabotaging nuclear power plants, research reactors, and radioactive materials storage facilities. Large cities are especially vulnerable to such attacks. A large city may host dozens of research reactors with a nuclear power plant or a couple of spent nuclear fuel storage facilities and dozens of large radioactive materials storage facilities located nearby. The past few years have seen significant efforts made to enhance organizational and physical aspects of security at facilities, especially at nuclear power plants. Efforts have also been made to improve security culture. But these efforts do not preclude the possibility that well-trained terrorists may be able to penetrate nuclear facilities. ¶ Some estimates show that sabotage of a research reactor in a metropolis may expose hundreds of thousands to high doses of radiation. A formidable part of the city would become uninhabitable for a long time.¶ Of all the scenarios, it is building an improvised nuclear device by terrorists that poses the maximum risk. There are no engineering problems that cannot be solved if terrorists decide to build a simple “gun-type” nuclear device. Information on the design of such devices, as well as implosion-type devices, is available in the public domain. It is the acquisition of weapons-grade uranium that presents the sole serious obstacle. Despite numerous preventive measures taken, we cannot rule out the possibility that such materials can be bought on the black market. Theft of weapons-grade uranium is also possible. Research reactor fuel is considered to be particularly vulnerable to theft, as it is scattered at sites in dozens of countries. There are about 100 research reactors in the world that run on weaponsgrade uranium fuel, according to the International Atomic Energy Agency (IAEA).¶ A terrorist “gun-type” uranium bomb can have a yield of least 10-15 kt, which is comparable to the yield of the bomb dropped on Hiroshima. The explosion of such a bomb in a modern metropolis can kill and wound hundreds of thousands and cause serious economic damage. There will also be long-term sociopsychological and political consequences.¶ The vast majority of states have introduced unprecedented security and surveillance measures at transportation and other large-scale public facilities after the terrorist attacks in the United States, Great Britain, Italy, and other countries. These measures have proved burdensome for the countries’ populations, but the public has accepted them as necessary. A nuclear terrorist attack will make the public accept further measures meant to enhance control even if these measures significantly restrict the democratic liberties they are accustomed to. Authoritarian states could be expected to adopt even more restrictive measures.¶ If a nuclear terrorist act occurs, nations will delegate tens of thousands of their secret services’ best personnel to investigate and attribute the attack. Radical Islamist groups are among those capable of such an act. We can imagine what would happen if they do so, given the anti-Muslim sentiments and resentment that conventional terrorist attacks by Islamists have generated in developed democratic countries. Mass deportation of the non-indigenous population and severe sanctions would follow such an attack in what will cause violent protests in the Muslim world. Series of armed clashing terrorist attacks may follow. The prediction that Samuel Huntington has made in his book “The Clash of Civilizations and the Remaking of World Order” may come true. Huntington’s book clearly demonstrates that it is not Islamic extremists that are the cause of the Western world’s problems. Rather there is a deep, intractable conflict that is rooted in the fault lines that run between Islam and Christianity. This is especially dangerous for Russia because these fault lines run across its territory. To sum it up, the political leadership of Russia has every reason to revise its list of factors that could undermine strategic stability. BMD does not deserve to be even last on that list because its effectiveness in repelling massive missile strikes will be extremely low. BMD systems can prove useful only if deployed to defend against launches of individual ballistic missiles or groups of such missiles. Prioritization of other destabilizing factors—that could affect global and regional stability—merits a separate study or studies. But even without them I can conclude that nuclear terrorism should be placed on top of the list. The threat of nuclear terrorism is real, and a successful nuclear terrorist attack would lead to a radical transformation of the global order. All of the threats on the revised list must become a subject of thorough studies by experts. States need to work hard to forge a common understanding of these threats and develop a strategy to combat them. High risk of agroterror which collapses the economy and food security. Olson, Federal Bureau of Investigation National Academy MA, 2012 [Dean, FBI Law Enforcement Bulletin, “Threats to America’s Economy and Food Supply” http://www.fbi.gov/stats-services/publications/law-enforcement-bulletin/february2012/agroterrorism, accessed 3-23-14, TAP] The United States enjoys a safe, plentiful, and inexpensive food supply. Americans spend only 11 percent of their income on food compared with the global average of 20 to 30 percent.1 The nation’s agricultural abundance helps drive its economic prosperity. As many as 1 of 6 jobs are linked to agriculture, a trillion-dollar industry. Agriculture-related products comprise nearly 10 percent of all U.S. exports, amounting to nearly $68 billion in 2006.2¶ Terrorists consider America’s agriculture and food production tempting targets. They have noticed that its food supply is among the most vulnerable and least protected of all potential targets of attack. When American and allied forces overran al Qaeda sanctuaries in the caves of eastern Afghanistan in 2002, among the thousands of documents they discovered were U.S. agricultural documents and al Qaeda training manuals targeting agriculture.¶ A subset of bioterrorism, agroterrorism is defined as “the deliberate introduction of an animal or plant disease for the purpose of generating fear, causing economic losses, or undermining social stability.”3 It represents a tactic to attack the economic stability of the United States. Killing livestock and plants or contaminating food can help terrorists cause economic crises in the agriculture and food industries. Secondary goals include social unrest and loss of confidence in government.¶ Serious Concern¶ Agroterrorism is not new. The Assyrians poisoned enemy wells with rye ergot during the 6th century B.C. During World War I, German agents in the United States infected horses and cattle in transit across the Atlantic to France. In 1994, in The Dalles, Oregon, a religious cult intentionally contaminated 10 restaurant salad bars with salmonella, sickening more than 750 people in an attempt to influence the outcome of a local election. Since 1912, 12 documented cases have involved the substate use of pathogenic agents to infect livestock or contaminate food.4¶ Terrorist leaders realize that America&rsquo;s strength stems largely from its economic vitality.¶ The agroterrorism threat emanates from four categories of perpetrators. The foremost threat is posed by transnational groups, like al Qaeda—widely believed to present the most probable threat of inflicting economic harm on the United States.¶ The second group is comprised of economic opportunists tempted to manipulate markets. They understand that a foot and mouth disease (FMD) outbreak, for example, would have a dramatic impact on markets. By introducing the virus, they could exploit the markets for personal economic gain. ¶ The third category includes domestic terrorists who may view the introduction of FMD as a blow against the federal government. As an outlier of this category, the unbalanced individual or disgruntled employee may perpetrate an attack for a variety of idiosyncratic or narcissistic motivations.¶ Finally, militant animal rights or environmental activists pose a threat because they consider immoral the use of animals for food. Groups, such as the Animal Liberation Front and its sister organization, the Earth Liberation Front, could view an attack on the animal food industry a positive event.5¶ Threat Environment¶ Because it lacks the drama and spectacle of more common terrorist violence, such as bombings and murders, agroterrorism has remained a secondary consideration, and no documented attacks in the homeland have occurred since 9/11. Several recent factors may have made agroterrorism a more attractive tactic.¶ First, the threat environment has changed dramatically. America has had recent successes against al Qaeda’s leadership. These victories have forced the group to morph in both structure and tactics. The increasingly dangerous environment it now must operate in has prevented it from mounting catastrophic terrorist attacks on the scale of 9/11. Now, al Qaeda places its emphasis on smaller, independent attacks following a “death by a thousand cuts” strategy to exhaust, overwhelm, and distract U.S. Department of Homeland Security forces. The group seeks to flood America’s already information overloaded intelligence systems with myriad threats and “background noise.”6 Agroterrorism also may serve as a way to magnify the social upheaval caused by smaller, independent attacks, like bombings.¶ Second, Usama Bin Ladin consistently had argued that attacking the U.S. economy represented the best way to destroy America’s ability to project military power abroad. Underpinning this view is al Qaeda’s historical narrative that jihad against the Soviets following the invasion of Afghanistan led not only to the defeat of the Red Army but, ultimately, to the demise of the U.S.S.R.7 As divorced from reality as this view seems, economic harm remains one of the pillars of al Qaeda’s terror strategy against the United States. In a video broadcast before the 2004 U.S. presidential elections, Usama Bin Ladin bragged that his organization “…bled Russia for 10 years until it went bankrupt and was forced to withdraw in defeat…. We are continuing in the same policy to make America bleed profusely to the point of bankruptcy….” He boasted that the 9/11 attacks had cost al Qaeda $500,000 while inflicting a staggering $500 billion in economic losses to America.8 According to Bin Ladin, “every dollar of al Qaeda defeated a million dollars [of America]...besides the loss of a huge number of jobs.”¶ Analysts believe that al Qaeda’s evolving tactics increasingly will “focus on targets that will yield the most economic damage .”9 Terrorist leaders realize that America’s strength stems largely from its economic vitality. They pursue an overarching strategy that all attacks should focus on weakening America’s economic strength, especially through protracted guerilla warfare. In their view, as the United States loses its standing in the Middle East, groups, like al Qaeda, can gain ground and remove from power regimes they view as corrupt and illegitimate.10¶ Terrorists know that a successful agroterrorism incident threatens America’s economic welfare and its standing as a leading exporter of agricultural products to the world. A significant disruption in agricultural exports caused by such an attack would have ripple effects in the United States’ and global economies. This economic disruption would occur on three levels.¶ The first involves direct losses due to containment measures, such as stop-movement orders (SMOs) or quarantines of suspected stock. Additional costs would arise from the culling and destruction of disease-ridden livestock.11 Second, indirect multiplier effects, such as compensation to farmers for destruction of agricultural commodities and losses suffered by directly and indirectly related industries, would arise.12 And, third, international costs would result from protective trade embargoes. Less measurable consequences would include the undermining of confidence in and support of government, creation of social panic, and threat to public health on the national and global levels.¶ Given its ease of execution and low cost to high benefit ratio, agroterrorism fits the evolving strategy of al Qaeda that focuses on inexpensive but highly disruptive attacks in lieu of monumental ones. Agroterrorism could exacerbate the social upheaval caused by random bombings. The ability to employ cheap and unsophisticated means to undermine America’s economic base, combined with the added payoff to potentially overwhelm its counterterrorism resources, makes livestock- and food-related attacks increasingly attractive.13¶ Foot and Mouth Disease¶ Attacks directed against the cattle, swine, or poultry industries or via the food chain pose the most serious danger for latent, ongoing effects and general socioeconomic and political disruption. Experts agree that FMD presents the most ominous threat.14 Eradicated in the United States in 1929, FMD remains endemic in South America, Africa, and Asia.15 An especially contagious virus 20 times more infectious than smallpox, FMD causes painful blisters on the tongues, hooves, and teats of cloven-hoofed animals, including cattle, hogs, sheep, goats, and deer, rendering them unable to walk, give milk, eat, or drink. Although people generally cannot contract the disease, they can carry the virus in their lungs for up to 48 hours and transmit it to animals. The animal-to-animal airborne transmission range is 50 miles.16 An infected animal can shred the virus in large quantities from its upper respiratory tract via drooling, coughing, and discharging mucus. Extremely stable, FMD can survive in straw or clothing for 1 month and spread up to 100 kilometers via the wind. Because herds exist as highly crowded populations bred and reared in extremely close proximity to one another, a significant risk exists that such pathogenic agents as FMD will spread well beyond the locus of a specific outbreak before health officials become aware of a problem. An FMD outbreak could spread to as many as 25 states in as little as 5 days simply through the regulated movement of animals from farm to market.17¶ From a tactical perspective, an FMD attack holds appeal for several reasons. First, unlike biological warfare directed against humans, no issue of weaponization exists. In an FMD attack, the animals themselves serve as the primary medium for pathogenic transmission, and countries as close as those in South America offer a ready source of the virus. As one analyst described it, the virus “can be spread by simply wiping the mucus from an infected animal on a handkerchief and then transferring the virus to healthy animals by wiping their noses…by stopping on a highway in rural America and releasing the virus among curious livestock an outbreak could be initiated.”18¶ Second, FMD is nonzoonotic, presenting no risk of accidental human infection. There exists no need for elaborate personal protective equipment or an advanced understanding of animal disease science. In a biowarfare attack targeting people, the deadly pathogen poses a threat to the perpetrators, as well as their intended victims. Preparing the pathogen so that terrorists can handle it safely yet disseminate it effectively to intended victims can prove difficult. For instance, the Aum Shinrikyo sarin gas attacks on the Tokyo subway in 1994 largely failed to kill the number of people intended due to the crude method of dissemination.¶ Third, terrorists could introduce and subsequently disperse the virus throughout the American food production system through multiple carriers, including animals carrying and introducing it into susceptible herds; animals exposed to contraband materials, such as contaminated food, hay, feedstuffs, hides, or biologics; people wearing clothing or using equipment, including tractors and trucks, to transmit the virus to uninfected animals; and contaminated facilities, such as feed yards, sale barns, and trucks that commonly hold or transport susceptible animals.19¶ The same factors that yield inexpensive and plentiful food by promoting maximum production efficiency also make American agricultural systems inherently vulnerable. The highly concentrated and intensive nature of livestock production encourages the rapid spread of contagious pathogens.20 Most dairies house at least 1,500 cows, with the largest facilities containing 10,000. Animals often are born on breeding farms and then transported to another state for slaughtering and processing. Otherwise isolated and widely dispersed farms often share equipment, vehicles, and veterinary instruments. Feedlots and auctions routinely intermingle animals from a wide geographic area. On average, a pound of meat travels 1,000 miles before it reaches the consumer’s table.21¶ The introduction of FMD would require the mass slaughter and disposal of infected animals. An outbreak could halt the domestic and international sale of meat and meat products for years. In this regard, in 2001, FMD in the United Kingdom affected 9,000 farms and required the destruction of more than 4,000,000 animals. Researchers believe that a similar outbreak in the United States would cost taxpayers up to $60 billion.22 An FMD attack could result in massive herd culling, the need to destroy processed goods, and extensive decontamination efforts of production and livestock-containment facilities. Most Americans have not witnessed the intense media coverage of high-volume culling operations involving the destruction and disposal of tens of thousands of animals. Large-scale eradication and disposal of livestock likely would be especially controversial as it affects farmers and ranchers and offends the sensibilities of animal rights activists and environmental organizations.¶ Food Production and Distribution¶ If terrorists strive for human deaths, the food production and distribution chain offers a low-tech but effective mechanism for disseminating toxins and bacteria, such as botulism, E. coli, and salmonella. Developments in the farm-to-table continuum greatly have increased the number of entry points for these agents. Many food processing and packing plants employ large, unscreened seasonal workforces. They commonly operate uneven standards of internal quality and inadequate biosurveillance control to detect adulteration.23 These vulnerabilities, combined with the lack of security at many processing and packing plants, contribute to the ease of perpetrating a food-borne attack.¶ Beyond the economic and political impact, low-tech bioterrorist assaults against the food chain have the potential to create social panic as people lose confidence in the safety of the food supply. A large-scale attack potentially could undermine the public’s confidence in its government. Because most processed food travels to distribution centers within a matter of hours, a single case of chemical or biological adulteration could have significant latent ongoing effects, particularly if the source of the contamination is not immediately apparent and there are acute ailments or deaths.24 Supermarkets in major American cities stock only a 7-day supply of food; therefore, any significant and continuing disruption in supply quickly will lead to severe shortages.¶ Experts believe that fruit- and vegetable-packing plants are among the most vulnerable venues for food-borne attacks. Many represent small-scale manufacturers that specialize in ready-to-eat meats or aggregated foodstuffs. They do not practice uniform biosecurity methods, and they do not use heat, an effective front-end barrier against pathogens, in food processing. Also, because they deal in alreadyprepared produce that does not require cooking—a good back-end defense against microbial introduction—they provide a viable portal to introduce pathogens.¶ Law Enforcement Preparedness¶ Farms, ranches, and feedlots in America are dispersed, open, and generally unprotected. The majority of state and local law enforcement agencies face financial and strategic challenges when responding to agroterrorism, yet the laws of many states treat agroterrorism as a crime investigation, giving local law enforcement agencies primary responsibility.¶ An outbreak of FMD would exhaust law enforcement resources quickly. After recognition of the disease by state agriculture authorities, subsequent steps in the emergency response involve containment and eradication, often involving multiple herds and a large quarantine area that may encompass multiple counties. State agriculture authorities working with the U.S. Department of Agriculture’s Animal and Plant Health Inspection Service have responsibility and authority for animal disease.25 Specially trained animal health officials make decisions on disease control, such as livestock quarantine and the timing and method of livestock depopulation—culling, destroying, and disposing of diseased animals from infected herds by burning or burial.¶ Following strict biosecurity measures can prevent the spread of disease. Local and state law enforcement would play a pivotal role in this effort by adhering to three primary responsibilities. ¶ First, police officials would enforce quarantine orders given by state agriculture authorities. This involves isolating and containing infected stock to prevent the spread of disease. A quarantine area would comprise a 6-mile radius, approximately 113 square miles, surrounding the point of origin; numerous roadblocks would prevent vehicles, equipment, or persons from entering or leaving without detailed decontamination measures and authorization.26 Inside the quarantine area, officials would establish an “exposed zone” in which all cloven-hoofed animals would be destroyed. For effectiveness, quarantine of infected premises and SMOs would have to remain in effect for a minimum of 30 days.27¶ The second responsibility occurs in conjunction with quarantine. Officers would enforce SMOs issued by the state governor to prevent the spread of the disease.28 Initial biosecurity efforts could require placement of all animals under an SMO. Law enforcement may be empowered to restrict human and animal movement in and out of the quarantine zone. This authority would include all animals in transit within a wide geographic area until the investigation clarified the extent of the infection and determined which animals can move safely. Although FMD affects only cloven-hoofed animals, humans, horses, and other animals may carry the virus.¶ Enforcing an SMO would require care and shelter for animals in transit that must be temporarily unloaded and housed at local sites providing feed and water.29 During the SMO, law enforcement would interview drivers to determine points of origin and destinations of animals. Research indicates that officers would stop and evaluate an average of nearly 50 vehicles per hour in the first day of an SMO.¶ Third, the criminal investigation of the outbreak further would tax already strained law enforcement resources. The investigation would focus on identifying the source of the virus and the mechanism used to infect susceptible animals. The danger of additional infections by the perpetrators would make the criminal investigation time sensitive.¶ Many law enforcement agencies lack the sufficient resources and procedures to simultaneously cope with quarantines, SMOs, and criminal investigations while also staffing widely dispersed checkpoints around the clock for the duration of the emergency. When combined with the need also to deliver routine law enforcement services, most agencies would struggle to meet these demands, especially during the protracted nature of an FMD outbreak.¶ Conclusion¶ Agriculture may not represent terrorists’ first choice of targets because it lacks the shock factor of more traditional attacks; however, it comprises the largest single sector in the U.S. economy, making agroterrorism a viable primary aspiration. Such terrorist groups as al Qaeda have made economic and trade disruption key goals. They believe that by imposing economic hardship on America, its citizens will tire of the struggle and force their elected leaders to withdraw from commitments abroad.¶ Every level of the food chain, including farms, feedlots, chemical storage facilities, meatpacking plants, and distribution operations, remains vulnerable to agroterrorism. Because terrorists rely on a lack of preparedness, law enforcement agencies should develop a plan to prevent agroterrorism and minimize the results of an attack. Officers must investigate from an agroterrorism perspective thefts of livestock; a criminal organization may steal animals with the intent of infecting them and placing them back into the population. Thefts of vaccines, medicines, and livestock-related equipment should be of concern and carefully investigated. It also is vital that law enforcement officials forward reports of such incidents to their states’ intelligence-fusion centers, threat-integration centers, or law enforcement intelligence units or networks. Economic collapse leads to global war. Lind, New America Foundation Economic Growth Program Policy Director, 5/11/2010 [Michael, "Will the great recession lead to World War IV?," http://www.salon.com/news/economics/index.html?story=/opinion/feature/2010/05/11/great _recession_world_war_iv] an era of global economic stagnation will help the nationalist and populist right, at the expense of the neoliberal and cosmopolitan/multicultural left. During the Long Depression of the late 19th century, which some historians claim lasted from 1873 to 1896, the nations of the West adopted protectionist measures to promote their industries. Beginning with Bismarck’s Germany, many If history is any guide, countries also adopted social reforms like government pensions and health insurance. These reforms were often favored by the nationalist right, as a way of luring the working class away from the temptations of Marxism and left-liberalism. By and large the strategy worked. When World War I broke out, the working classes and farmers in most countries rallied enthusiastically around their respective flags. The Great Depression of the 1930s similarly led to the rise of one or another version of the authoritarian, nationalist right in Europe. Only in a few societies with deeply established liberal traditions, like the English-speaking countries and Scandinavia, did liberals or liberal conservatives hold on. And Franklin Delano Roosevelt’s New Deal Democratic Party, a coalition that included racist Southerners and traditionalist Catholic immigrants, was not particularly liberal by today’s standards. In both eras of depression, great-power rivalry for resources and markets intensified and ultimately led to a world war. Following World War II, the U.S. sought to avert a repetition of that pattern, by creating a global market secured by a global great-power concert in the form of the Security Council. But the project of economic disarmament and security cooperation broke down almost immediately after 1945 and the split between the Soviets and the Anglo-Americans produced the Cold War. The second attempt at a global market that began after the Cold War may be breaking down now, as the most important economic powers pursue their conflicting national interests. A functioning global market system can work only if its members abandon mercantilism -- the policy of trying to enjoy perpetual trade surpluses, by fair means or foul. However, the nations with the three largest economies after the U.S. -- China, Japan and Germany -- all want to enjoy never-ending merchandise trade surpluses. All three have used "currency mercantilism" to help their export industries, to the detriment of the global economic system. China and Japan, by different methods, have deliberately undervalued their currencies, to help their exports and keep imports out of their markets. Germany accomplished something similar, by persuading its trade partners to give up independent currencies that they were able to revalue for the crippling straitjacket of the euro. The system worked only as long as Americans borrowed to pay for imports from Japan and China, while southern Europeans borrowed to pay for imports from Germany. But the consumers are tapped out and neither Americans nor southern Europeans are in a mood for austerity measures in the middle of a near-depression. Unless the Chinese, Japanese and Germans turn into credit-happy consumer societies the global economy may be in for prolonged stagnation. Instead of changing their ways, however, the surplus This will not end happily. As the oversold promise of free-market globalization fades, countries large and small may turn increasingly toward state capitalism. At countries are denouncing their own customers for their profligacy in buying their goods and insisting that the same customers be penalized by austerity programs. home, this would mean permanent state support of troubled industries like banking and the automobile industries, which all of the major industrial countries have bailed out. In trade, this would mean a retreat from global trade areas toward regional blocs and bilateral deals. Examples include agreements between energy-hungry governments like those of China and Japan and the state-owned oil or natural gas companies of Saudi Arabia and Russia. In a world of diplomatic rivalries among great powers to win contracts with Direct war between great powers seems unlikely, but if the Cold War was World War III, then a cold World War IV resembling Orwell’s shifting coalitions of Eurasia, Eastasia and Oceania in 1984 is all too easy to imagine. state-owned corporations, the distinctions between geoeconomics and geopolitics would erode, with potentially dangerous consequences. Ag collapse causes extinction Lugar, Senate foreign relations committee former member, 2K [Richard, former senator from Indiana, “Calls for a new green revolution to combat global warming and reduce world instability” http://www.unep.org/OurPlanet/imgversn/143/lugar.html, accessed 1-17-13, TAP] In a world confronted by global terrorism, turmoil in the Middle East, burgeoning nuclear threats and other crises, it is easy to lose sight of the long-range challenges. But we do so at our peril. One of the most daunting of them is meeting the world’s need for food and energy in this century. At stake is not only preventing starvation and saving the environment, but also world peace and security. History tells us that states may go to war over access to resources, and that poverty and famine have often bred fanaticism and terrorism. Working to feed the world will minimize factors that contribute to global instability and the proliferation of [WMDs] weapons of mass destruction. With the world population expected to grow from 6 billion people today to 9 billion by mid-century, the demand for affordable food will increase well beyond current international production levels. People in rapidly developing nations will have the means greatly to improve their standard of living and caloric intake. Inevitably, that means eating more meat. This will raise demand for feed grain at the same time that the growing world population will need vastly more basic food to eat. Complicating a solution to this problem is a dynamic that must be better understood in the West: developing countries often use limited arable land to expand cities to house their growing populations. As good land disappears, people destroy timber resources and even rainforests as they try to create more arable land to feed themselves. The long-term environmental consequences could be disastrous for the entire globe. Productivity revolution To meet the expected demand for food over the next 50 years, we in the United States will have to grow roughly three times more food on the land we have. That’s a tall order. My farm in Marion County, Indiana, for example, yields on average 8.3 to 8.6 tonnes of corn per hectare – typical for a farm in central Indiana. To triple our production by 2050, we will have to produce an annual average of 25 tonnes per hectare. Can we possibly boost output that much? Well, it’s been done before. Advances in the use of fertilizer and water, improved machinery and better tilling techniques combined to generate a threefold increase in yields since 1935 – on our farm back then, my dad produced 2.8 to 3 tonnes per hectare. Much US agriculture has seen similar increases. But of course there is no guarantee that we can achieve those results again. Given the urgency of expanding food production to meet world demand, we must invest much more in scientific research and target that money toward projects that promise to have significant national and global impact. For the United States, that will mean a major shift in the way we conduct and fund agricultural science. Fundamental research will generate the innovations that will be necessary to feed the world. The United States can take a leading position in a productivity revolution. And our success at increasing food production may play a decisive humanitarian role in the survival of billions of people and the health of our planet. Internet Freedom Adv – Insert from Old Aff Surveillance undermines US internet credibility – reviving judicial accountability is key. Clement, University of Toronto Faculty of Information professor, 2013 [Andrew, Information Policy Research Program coordinator and Identity, Privacy, and Security Institute co-founder, and PhD in computer science, 3-13-13, “Democratic State Surveillance, Transparency and Trust” http://www.cyberdialogue.ca/2013/03/democratic-state-surveillancetransparency-and-trust-by-andrew-clement/, accessed 7-10-15, TAP] Those of us who believe that democratic governments have a central role to play in multistakeholder cyberspace governance have received in the past few weeks a bracing reminder of both the hazards of this ideal in practice and the importance of broad-based civil society mobilization. Democratic states, while not sufficient for effective internet governance, are necessary parties because no other institutions have yet emerged that combine as well as they do the inclusivity, legitimacy and resources to help manage the internet effectively in the broad public interest. However, when such states violate the democratic principles that they espouse and are built on, they seriously undermine their legitimacy as well as the viability of the internet governance project overall. Two events in February related to state surveillance in North America illustrate such problematic governmental behaviour and point to the importance of transparency for restoring trust in governance processes. On February 26 the U.S. Supreme Court ruled against a group of human rights organizations and journalists seeking to challenge the constitutionality of the warrantless domestic surveillance program that the National Security Agency (NSA) has been conducting since 2001. Earlier that month the Canadian government announced that in light of strong public opposition, it had dropped proposed legislation mandating many of the same controversial internet surveillance features. Far from being isolated events, these cases are just two among a larger set of contentious, on-going governmental attempts to surveil individuals and criminalize many common internet activities that raise disturbing civil liberties issues and provoke popular resistance. Shortly after 9/11, the NSA embarked on what is likely the largest domestic surveillance operation in history . On presidential order but without warrants, court orders or legislative sanction, the NSA installed fibre-optic splitters in the main switching centres of the major telecom carriers, enabling the agency to selectively intercept, store and analyse a large portion of internet communications. We only know of this surveillance dragnet thanks to brave whistleblowers formerly at AT&T (Mark Klein) and the NSA (William E. Binney, Thomas A. Drake, and J. Kirk Wiebe), determined journalists (e.g. James Bamford and Jane Mayer) and the more than 40 court cases filed against the telecommunications carriers and the government (mainly litigated by the American Civil Liberties Association (ACLU) and the Electronic Frontier Foundation (EFF)). While the federal government subsequently acknowledged the existence of the warrantless wiretapping program, it has fought to keep every aspect of it away from public scrutiny. The Foreign Intelligence Surveillance Amendments Act (FISAA) gave retroactive immunity from prosecution to AT&T, Verizon/MCI, BellSouth, Sprint and Cingular, all of which had pending court cases against them. In the cases against it, the federal government has consistently invoked a ‘state secrets’ override that has so far successfully kept all but one of them from going to trial. When FISAA passed in 2008, the ACLU immediately challenged its constitutionality on behalf of a group of journalists and human rights lawyers in Clapper v. Amnesty. The recent Supreme Court decision closed this case by finding that the plaintiffs lacked the standing to bring charges because they couldn’t demonstrate that the NSA had targeted them, nor that they had faced “certainly impending” injury by its surveillance. In other words, the constitutional issues raised by the warrantless wiretapping program have not been addressed and further it appears that they may never be, because no party would be granted standing until they can positively demonstrate they have been its victims. In a Kafkaesque twist, the government has in effect rendered its secret surveillance activities immune from legal challenge and public accountability — a clear undermining of liberal democratic norms to say the least. In Canada, ‘lawful access’ legislation designed to give law enforcement, security agencies (such as the Communications Security Establishment Canada (CSEC), and Canadian Security Intelligence Service (CSIS)) and other branches of government similarly broad surveillance powers has been introduced into Parliament on four occasions since 2005. Each time it died on the order paper without parliamentary debate, until February 2012 when the Conservative government introduced it as Bill C-30 and began actively promoting it. Anticipating this re-introduction a broad coalition of civil liberties and on-line advocacy organizations, academics and privacy commissioners mounted the oppositional Stop Online Spying campaign that included videos, public service announcements, posters, letter writing, screenings, and an on-line petition that eventually garnered over 125,000 signatories. The major concerns highlighted in the campaign included allowing authorities access to internet subscriber information without a warrant, no substantial justification for the additional surveillance and policing powers, a requirement that telecommunications service providers install equipment to enable interception of subscriber communication and no effective reporting or accountability. Evidently to boost its appeal, the government changed the name of the bill on the day of the announcement to “Protecting Children from Internet Predators Act”, but this backfired when the Public Safety Minister, Vic Toews, declared that one could either stand with the government or “with the child pornographers” prowling online. This provoked an immediate storm of protest with a large social media component. Public opinion polls showed a significant drop in public support, from a majority (56% Ipsos-Reid) shortly after re-introduction to just 23% (Postmedia News) a year later. Though with a parliamentary majority the government could have forced this bill through, they deemed the political price too high and on February 11, 2013 declared that they were dropping the legislation. While much of the surveillance covered by the lawful access bill continues quietly under the current privacy legislation and some of the key proposed measures are being re-introduced piecemeal as parts of other legislation, this declaration constituted a surprising victory for civil liberties advocates. This outcome echoes similar campaigns in the US a year earlier around the Stop Online Piracy Act (SOPA) and PROTECT IP Act (PIPA), both of which contained new surveillance measures and appeared set to pass the legislative branch until massive popular opposition forced a dramatic reversal. It remains to be seen whether the Cyber Intelligence Sharing and Protection Act (CISPA), now before Congress with similar surveillance provisions as the Canadian lawful access legislation, will also be turned back by popular opposition. In each of these cases we can see a recurring pattern of lack of transparency of government action in relation to the surveillance and related ‘security’ measures. This lack of transparency is observed in both the process of developing surveillance capabilities and in the substance of their (proposed) enactments. Far from providing a basis for informed public decision making about matters affecting the relationship between state and citizen that is hallmark of democratic societies, we repeatedly witness the marginalization of public involvement at every stage. The familiar invocation of security and protection as taking such precedence over other considerations that it doesn’t merit discussion is wearing thin after more than a decade of exaggerated fears and little evidence of positive results. Both the US and Canadian governments appear to offer as little information as possible about proposed surveillance measures, provide bogus or at best flimsy justifications, avoid opportunities to examine or debate issues, dismiss or close down public discussion when it occurs, and actively resist critical inquiry. In stark contrast to the lack of public consultation, but well in keeping with neo-liberal norms, the leading private sector actors have in each case been heavily involved behind the scene, and at least with the intellectual property legislation, they have been prime movers pushing the state to tighten internet surveillance. When details of state surveillance practices do emerge, they show similar patterns of governmental preemption of citizen rights previously taken for granted. These include fine-grained surveillance of individual on-line behavior, weakening or elimination of conventional norms of judicial oversight such as court orders or search warrants and a lack of mandated reporting, review requirements or other forms of public accountability . Few would disagree that states have a legitimate interest in developing the capacity to intercept communication in the service of national security, law enforcement and protection of vital infrastructure. But when they pursue even legitimate surveillance ends with illegitimate means it invites suspicion and opposition. The recent history of secrecy, over-reach, false claims and unwarranted targeting of individuals and groups unsurprisingly brings hostile responses from those concerned for democratic values. This reaction may make governments even more wary of disclosure, thus fueling the vicious cycle we are witnessing. However, if they were to act more in line with the ideals of openness, transparency and democracy they espouse and insist others respect, they would gain significantly in the forms of trust that are so vital for effective governance . For a start, transparent governments would earn more domestic support for the surveillance they actually do need. In addition, they would gain credibility in the international fora , such as the recent conferences Roger Hurwitz mentions in his blog post, whether making claims for national sovereignty or advancing openness and freedom . The principle of transparency of course needs to apply to other cyberspace actors, in proportion to their power and influence. In particular the large private sector enterprises, notably the telecommunication carriers and equipment vendors, that have so closely colluded with state security agencies across ‘democratic’ as well as authoritarian regimes, would do well to be more transparent. The Transparency Reports that several major internet enterprises, such as Google and Twitter, have begun producing represent a small but promising step in this direction. If all parties to multi-stakeholder forums insisted on greater transparency and led by example, it would contribute significantly to building the necessary trust and confidence while mitigating the ‘fortress’ approach that is so hampering the internet governance discussion. Growing transparency, especially in the area of internet surveillance, is an essential pre-condition for developing global cyberspace governance as a welcoming ‘oasis’ where everyone has a part to play, thereby enriching us all. K 1ac Anti-Blackness Contention The FBI has surveillance authority to commit prejudicial monitoring on the basis of race, religion, and ethnicity. Unegbu, Howard University JD candidate, 2013 [Cindy, 57 How. L.J. 433, “NOTE AND COMMENT: National Security Surveillance on the Basis of Race, Ethnicity, and Religion: A Constitutional Misstep” Lexis, accessed 7-6-15, TAP] In addition to the procedural power given to the NCTC through its amended guidelines, the FBI has been given express surveillance procedural authority through the DIOG . 93Link to the text of the note The new rules were enacted to give agents more latitude as they search for indications of criminal and terrorist activity. 94Link to the text of the note The various FBI surveillance procedures that have been outlined include the ability to observe and collect any form of protected speech by citizens and those residing within the country's jurisdiction. 95Link to the text of the note Furthermore, the FBI has the authority to use religion as a factor when determining whether an individual or group deserves greater scrutiny and monitoring. 96Link to the text of the note Race and ethnicity may be considered as a factor in its national security assessment, as long as it is not the dominant factor for focusing on a particular person. 97Link to the text of the note Another power that has been granted is the authority to retain personal information that has been collected on an individual, even if an assessment does not suggest that an individual is engaged in any wrongdoing. 98Link to the text of the note Perhaps the most daunting new permission that has been granted to the FBI is the ability to monitor domestic individuals and citizens without there being any presupposed suspicion of terrorist or criminal activity. 99Link to the text of the note The manual prohibits "racial profiling" in the national security assessments; however, it allows an assessor to monitor [449] "religious practitioners or religious facilities," 100Link to the text of the note and to identify locations of concentrated ethnic communities. 101Link to the text of the note The FBI, in essence, has the authority to infiltrate lawful and peaceful places of worship, communities and businesses, and take race, religion and ethnicity into account when developing its threat analysis. 102Link to the text of the note The guidelines permitting the use of race, religion, or ethnicity to assess national security threats or criminal activity could result in the unconstitutional and prejudicial monitoring of individuals . 103Link to the text of the note The massive expansion of the surveillance state depended on the perfection of imperial techniques abroad combined with concerns for regulating the market – these two forces combined to result in the racialized surveillance practices that created the era of the New Jim Crow in the Post Civil Rights period. Kundnani, New York University media culture and communication professor, and Kumar, Rutgers University media studies and Middle East studies professor, 2015 [Arun and Deepa, “Race, surveillance, and empire” http://isreview.org/issue/96/racesurveillance-and-empire, accessed 7-11-15, TAP] The expansion of the surveillance state in the twentieth century was one aspect of a wider penetration of the state into the lives of Americans. Working class struggle had somewhat unexpectedly driven this expansion: the state responded by taking on a mediating role between labor and capital, offering a measure of protection from the ravages of a market economy through Keynesian economics and the creation of a welfare state after the New Deal—albeit one that was underdeveloped compared to Western Europe. State managers sought to stabilize capitalism by imposing a degree of “rationality” on the system through regulating the economy and providing social services, all of which required a greater penetration of the state into civil society.48 In the new era of neoliberal capitalism that began in the 1970s, ruling elites sought to break this social contract, which rested on the premise that, if the working class “played by the rules,” it could see increases in wages and living conditions. From the 1970s onwards, this arrangement was undone. Alongside, there were also the beginnings of a contraction of the social wage of welfare provisions, public housing, education, and healthcare. The end result was growing inequality and a new regime of the one percent. The state responded to the permanent joblessness, ghettoization, and stigmatization that neoliberalism produced among the poor by turning to policies of mass criminalization and incarceration. Thus, the neoliberal onslaught went hand in hand with securitization. As Loïc Wacquant writes, since the civil rights era America has launched into a social and political experiment without precedent or equivalent in the societies of the postwar West: the gradual replacement of a (semi-) welfare state by a police and penal state for which the criminalization of marginality and the punitive containment of dispossessed categories serve as social policy at the lower end of the class and ethnic order .49 The law and order rhetoric that was used to mobilize support for this project of securitization was racially coded, associating Black protest and rebellion with fears of street crime. The possibilities of such an approach had been demonstrated in the 1968 election, when both the Republican candidate Richard Nixon and the independent segregationist George Wallace had made law and order a central theme of their campaigns. It became apparent that Republicans could cleave Southern whites away from the Democratic Party through tough-on-crime rhetoric that played on racial fears. The Southern Strategy, as it would be called, tapped into anxieties among working-class whites that the civil rights reforms of the 1960s would lead to them competing with Blacks for jobs, housing, and schools. With the transformation of the welfare state into a security state, its embedding in everyday life was not undone but diverted to different purposes. Social services were reorganized into instruments of surveillance. Public aid became increasingly conditional on upholding certain behavioral norms that were to be measured and supervised by the state, implying its increasing intrusion into the lives of the poor—culminating in the “workfare” regimes of the Clinton administration.50 In this context, a new model of crime control came into being. In earlier decades, criminologists had focused on the process of rehabilitation; those who committed crimes were to be helped to return to society. While the actual implementation of this policy was uneven, by the 1970s, this model went out of fashion. In its place, a new “preventive” model of crime control became the norm, which was based on gathering information about groups to assess the “risk” they posed. Rather than wait for the perpetrator to commit a crime, risk assessment methods called for new forms of “preventive surveillance,” in which whole groups of people seen as dangerous were subject to observation, identification, and classification.51 The War on Drugs—launched by President Reagan in 1982—dramatically accelerated the process of racial securitization. Michelle Alexander notes that At the time he declared this new war, less than 2 percent of the American public viewed drugs as the most important issue facing the nation. This fact was no deterrent to Reagan, for the drug war from the outset had little to do with public concern about drugs and much to do with public concern about race. By waging a war on drug users and dealers, Reagan made good on his promise to crack down on the racially defined “others”—the undeserving.52 Operation Hammer, carried out by the Los Angeles Police Department in 1988, illustrates how racialized surveillance was central to the War on Drugs. It involved hundreds of officers in combat gear sweeping through the South Central area of the city over a period of several weeks, making 1,453 arrests, mostly for teenage curfew violations, disorderly conduct, and minor traffic offenses. Ninety percent were released without charge but the thousands of young Black people who were stopped and processed in mobile booking centers had their names entered onto the “gang register” database, which soon contained the details of half of the Black youths of Los Angeles. Entry to the database rested on such supposed indicators of gang membership as high-five handshakes and wearing red shoelaces. Officials compared the Black gangs they were supposedly targeting to the National Liberation Front in Vietnam and the “murderous militias of Beirut,” signaling the blurring of boundaries between civilian policing and military force, and between domestic racism and overseas imperialism.53 In the twelve years leading up to 1993, the rate of incarceration of Black Americans tripled,54 establishing the system of mass incarceration that Michelle Alexander refers to as the new Jim Crow.55 And yet those in prison were only a quarter of those subject to supervision by the criminal justice system, with its attendant mechanisms of routine surveillance and “intermediate sanctions,” such as house arrests, boot camps, intensive supervision, day reporting, community service, and electronic tagging. Criminal records databases, which are easily accessible to potential employers, now hold files on around onethird of the adult male population.56 Alice Goffman has written of the ways that mass incarceration is not just a matter of imprisonment itself but also the systems of policing and surveillance that track young Black men and label them as would-be criminals before and after their time in prison. From stops on the street to probation meetings, these systems, she says, have transformed poor Black neighborhoods into communities of suspects and fugitives. A climate of fear and suspicion pervades everyday life, and many residents live with the daily concern that the authorities will seize them and take them away.57 A predictable outcome of such systems of classification and criminalization is the routine racist violence carried out by police forces and the regular occurrences of police killings of Black people, such as Michael Brown in Ferguson, Missouri, on August 9, 2014. Racism is unethical and causes extinction Memmi, Professor Emeritus of Sociology at the University of Paris, 1997 [Albert, RACISM, p. 165] Of course, this is debatable. There are those who think that if one is strong enough, the assault on and oppression of others is permissible. But no one is ever sure of remaining the strongest. One day, perhaps, the roles will be society contains within itself the seeds of its own death. It is probably smarter to treat others with respect so that they treat you with respect. "Recall," says the Bible, "that you were once a stranger in Egypt," which means both that you ought to respect the stranger because you were a stranger yourself and that you risk becoming once again someday. It is an ethical and a practical appeal -- indeed, it is a contract, however implicit it might be. In short, the refusal of racism is the condition for all theoretical and practical morality . reversed. All unjust Public deliberation and informed public involvement over domestic surveillance is shut down now. Clement, University of Toronto Faculty of Information professor, 2013 [Andrew, Information Policy Research Program coordinator and Identity, Privacy, and Security Institute co-founder, and PhD in computer science, 3-13-13, “Democratic State Surveillance, Transparency and Trust” http://www.cyberdialogue.ca/2013/03/democratic-state-surveillancetransparency-and-trust-by-andrew-clement/, accessed 7-10-15, TAP] In each of these cases we can see a recurring pattern of lack of transparency of government action in relation to the surveillance and related ‘security’ measures. This lack of transparency is observed in both the process of developing surveillance capabilities and in the substance of their (proposed) enactments. Far from providing a basis for informed public decision making about matters affecting the relationship between state and citizen that is hallmark of democratic societies, we repeatedly witness the marginalization of public involvement at every stage. The familiar invocation of security and protection as taking such precedence over other considerations that it doesn’t merit discussion is wearing thin after more than a decade of exaggerated fears and little evidence of positive results. Both the US and Canadian governments appear to offer as little information as possible about proposed surveillance measures, provide bogus or at best flimsy justifications, avoid opportunities to examine or debate issues, dismiss or close down public discussion when it occurs, and actively resist critical inquiry . In stark contrast to the lack of public consultation, but well in keeping with neo-liberal norms, the leading private sector actors have in each case been heavily involved behind the scene, and at least with the intellectual property legislation, they have been prime movers pushing the state to tighten internet surveillance. When details of state surveillance practices do emerge, they show similar patterns of governmental preemption of citizen rights previously taken for granted. These include fine-grained surveillance of individual on-line behavior, weakening or elimination of conventional norms of judicial oversight such as court orders or search warrants and a lack of mandated reporting, review requirements or other forms of public accountability . Few would disagree that states have a legitimate interest in developing the capacity to intercept communication in the service of national security, law enforcement and protection of vital infrastructure. But when they pursue even legitimate surveillance ends with illegitimate means it invites suspicion and opposition. The recent history of secrecy, overreach, false claims and unwarranted targeting of individuals and groups unsurprisingly brings hostile responses from those concerned for democratic values. This reaction may make governments even more wary of disclosure, thus fueling the vicious cycle we are witnessing. However, if they were to act more in line with the ideals of openness, transparency and democracy they espouse and insist others respect, they would gain significantly in the forms of trust that are so vital for effective governance. For a start, transparent governments would earn more domestic support for the surveillance they actually do need. In addition, they would gain credibility in the international fora , such as the recent conferences Roger Hurwitz mentions in his blog post, whether making claims for national sovereignty or advancing openness and freedom . The principle of transparency of course needs to apply to other cyberspace actors, in proportion to their power and influence. In particular the large private sector enterprises, notably the telecommunication carriers and equipment vendors, that have so closely colluded with state security agencies across ‘democratic’ as well as authoritarian regimes, would do well to be more transparent. The Transparency Reports that several major internet enterprises, such as Google and Twitter, have begun producing represent a small but promising step in this direction. If all parties to multi-stakeholder forums insisted on greater transparency and led by example, it would contribute significantly to building the necessary trust and confidence while mitigating the ‘fortress’ approach that is so hampering the internet governance discussion. Growing transparency, especially in the area of internet surveillance, is an essential pre-condition for developing global cyberspace governance as a welcoming ‘oasis’ where everyone has a part to play, thereby enriching us all. Informed and active citizens are necessary to challenge the surveillance state. Unegbu, Howard University JD candidate, 2013 [Cindy, 57 How. L.J. 433, “NOTE AND COMMENT: National Security Surveillance on the Basis of Race, Ethnicity, and Religion: A Constitutional Misstep” Lexis, accessed 7-6-15, TAP] Initially, Americans welcomed the heightened security measures; however, as the government's surveillance measures began to increasingly violate domestic civil liberties, American sentiment became wearier of these government measures. 67Link to the text of the note In fact, a new CBS poll found [445] that nearly six in ten Americans said they were very concerned or somewhat concerned about losing privacy because of federal efforts to fight terrorism. 68Link to the text of the note The debate on national security surveillance practices has resulted in the public's awareness and disdain for the government's intrusive practices. Some of this disdain is sparked by the June 2013 information leak by Edward Snowden, a former intelligence agent who leaked to the public highly sensitive intelligence. 69Link to the text of the note He asserted that the public deserved to be aware of the government's intrusive intelligence gathering practices. 70Link to the text of the note In an interview with The Guardian, Snowden stated "'I, sitting at my desk,' … could 'wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email.'" 71Link to the text of the note This country's well-founded focus of national security has led to a development of policy and laws that create a very fine line between national security and the unrestrained infringement upon civil liberties. Because of responses to Freedom of Information Act requests, the government's surveillance practices are now exposed and shed some light on the inappropriate measures that are being taken in the post-9/11 national security era. 72Link to the text of the note High School Students learning about Surveillance is key to solve war and threatconstruction that justifies atrocities Ralston ’14 (Robert Ralston is a second-year Master's student in the Department of Political Science at Virginia Tech. His research interests broadly include international relations, critical security studies, cyberpolitics, and surveillance. Robert is writing a thesis that examines state ontological insecurity with respect to cyberspace, and how state surveillance practices are justified through narratives of liberty and security, MILTON WOLF SEMINAR, “CYBERSPACE AND SURVEILLANCE: CHALLENGES TO STATE IDENTITY AND ONTOLOGICAL SECURITY IN THE DIGITAL AGE” http://www.global.asc.upenn.edu/app/uploads/2015/04/Milton-Wolf-2014Compendium.pdf#page=41 DA:7/8/15 CB) Increasing state surveillance of the internet and regarding foreign and domestic internet policies a seeming lack of global accountability and best practices demands the attention of students, scholars, and practitioners of media and communication, political science, sociology, computer science, and the like. With these concerns in mind, the 2014 Milton Wolf Seminar highlighted themes of surveillance, visibility, disclosure, and espionage in the digital age. This essay seeks to touch upon some of these themes, and to present a case for the study of ontological security in international relations as a way to explain, in part, U.S. practices of surveillance following the leaks by former National Security Administration (NSA) contractor Edward Snowden. Politically, the stakes are high as cyberpolitics becomes an issue of “high politics” in the study of international relations; states and the agents who produce narratives about the state frame cyber discourse in ways that attempt to justify practices of surveillance, espionage, and censorship. States justify intrusion into cyberspace in the name of stability and an idealized self-image. This, can prove violent and costly, with parallels to justifying war on the basis of empire in offline venues. In cyber venues, the United States in particular has had to justify state intrusion into cyber venues. Void of routinized responses to “traditional” threats, the state must reshape or reconfigure its self-image in order to combat the contradictions inherent in state intrusions into cyberspace. Taking in consideration such concerns and dynamics, this essay first sets out to explain ontological security in the study of international relations and the discursive practices of U.S. state agents in justifying state surveillance practices. It then concludes by drawing parallels between these discursive practices and various presentations at the 2014 Milton Wolf Seminar. Ontological Security in International Relations Theory Physical security concerns dominate realist accounts of security in world politics (Mitzen 2006: 342). Ontological security in international relations goes beyond the premise that states are solely concerned with physical security. The assumption that states only seek physical security, Mitzen (2006: 364) argues, constrains international relations theory by failing to explain why states may seek or continue conflict at the expense of physical security. Inherent in the conception of a state’s ontological security is the notion of the state as person, or at the very least, that states are concerned with their own self-image. 20 Ontological security is about constructing and maintaining the stability of a state’s self-image. Power, in this regard, can be understood in terms 20 See Wendt (2004) for a discussion of the validity and appropriateness of understanding the state as person in international relations theory. 40 of “a centralized body’s internal capacity to perceive its ability to operate upon its own selfimage, as well as influence others and determine outcomes” (Steele 2010: 15). Thus, power is not solely based upon a state’s ability to make other actors do what they would otherwise not do, to pose material threats to other states, or assert global influence; power is about the state’s recognition that it can use and recreate its own self-image. States put forward narratives about themselves through state agents, such as government officials. State actions must be justified, even if they go against the grain of international norms or expectations (Steele 2008: 10). What is particularly interesting about the U.S response to the Snowden disclosures is the manner in which the disclosures were framed, the contradictions that arose as a result of this framing, and how the narratives that the state produced regarding NSA practices harken back to the self-image-making of the U.S. state. Why the United States? When examining speeches made by U.S. state agents, publications regarding U.S. citizenship, and the ways the United States is presented in popular culture, common trends emerge: The United States is presented as exceptional, as a land of shared values-- liberty, freedom, and prosperity—which were created by the nation’s founding fathers. David Campbell (1998: 131) suggests that America is an imagined community “par excellence.” America, like all other states, is dependent upon practices that make up its ontological being. However, as Campbell (1998) argues: Defined, therefore, more by absence than presence, America is peculiarly dependent on representational practices for its being. Arguably more than any other state, the imprecise process of imagination is what constitutes American identity (p. 91). Space and time in reference to U.S. identity is crucial to this analysis because successful fulfillment of ontological state security is predicated upon that state’s ability to maintain a consistent self-identity and self-image. Void of a people as a foundational element, the United States’ self-identity is quite fleeting, and, thus, hinges on representational, symbolic, and iconic imagery in order to ascribe to itself some form of identity (Campbell 1998: 132). The U.S. State Narrative In a speech made prior to Snowden’s disclosures, President Obama spoke of the necessity to secure cyber infrastructure while maintaining the internet as a free and open space: Our pursuit of cybersecurity will not—I repeat, will not include—monitoring private sector networks or Internet traffic. We will preserve and protect the personal privacy and civil liberties that we cherish as Americans. Indeed, I remain firmly committed to net neutrality so we can keep the Internet as it should be—open and free. In light of the Snowden disclosures, a contradiction arises between the actual behavior of the state through its national security agency and the self-image of the state. President Obama sends two distinct and seemingly irreconcilable messages regarding cyberspace: First, the United States, as a centralized power, recognizes the tensions that it must mediate between security and 41 liberty; Second, the United States has a vision for cyberspace, one focused on being “open and free.” But free for whom? U.S. security policy is decentralized insofar as it attempts to do too much while still trying to keep a constant self-image (See Campbell 1998 and Gould and Steele 2014). Cyberspace is not an “American thing,” but from cyberspace comes a multitude of images that only exacerbate the imagined nature of American identity. Thus, what cyberspace is and what cyberspace means, from an American perspective, is inherently American. Addressing the “noise” surrounding the practices of the National Security Administration, President Obama first noted the history of intelligence gathering by the United States: At the dawn of our Republic, a small, secret surveillance committee, born out of the Sons of Liberty, was established in Boston. And the group’s members included Paul Revere. At night, they would patrol the streets, reporting back any signs that the British were preparing raids against America’s early patriots. In order to find footing and precedent in the face of ontological insecurity in cyberspace two rhetorical moves are deployed. First, history is resurfaced and reworked to create a seemingly appropriate metaphor for the present. This history is doused in a patriotic whitewash, whereby particular events are chosen but not others that are perhaps more indicative and relevant to the current situation. Further, the parallels put forward by Obama are not parallels at all; the nature of surveillance, global politics, globalization, and technology are not the same as they were 200 or so years ago. This history serves to maintain the state’s self-image over time. Campbell (1998: 130) notes that the American quasi-war with France “demonstrated how previously established discursive strategies of otherness could be invoked in novel circumstances to provide powerful modes of understanding.” Much in the same way, President Obama’s return to history serves not only to ground justifications for NSA activities in seemingly consistent practices of state surveillance, but also in actions against threats from an “other,” in this case, the British during the Revolutionary War. Threats in cyberspace come from a plethora of sources, including: other states, non-state actors, rogue Americans, or even cyberspace itself. Obama’s second rhetorical move is to argue for American exceptionalism. He goes on to note, But America’s capabilities are unique, and the power of new technologies means that there are fewer and fewer technical constraints on what we can do. That places a special obligation on us to ask tough questions about what we should do. The justification for (at least toned down) policies of NSA surveillance centers on the notion that “someone has to do it,” and “we can do it better than anyone else.” America’s status as “the world’s only superpower,” as President Obama declares, opens itself up for interrogation. At the end of his speech on NSA reforms, President Obama demonstrates, perhaps unintentionally, that ontological insecurity is a powerful motivator for the United States in cyberspace: When you cut through the noise, what’s really at stake is how we remain true to who we are in a world that is remaking itself at dizzying speed. Whether it’s the ability of 42 individuals to communicate ideas, to access information that would have once filled every great library in every country in the world, or to forge bonds with people on the other side of the globe, technology is remaking what is possible for individuals and for institutions and for the international order . This is not to say that the United States consciously and reflexively recognizes its ontological insecurity in its relationship to cyberspace. However, the examples that are raised concerning the dangers of cyberspace—from cyberspace as a mechanism for terrorist mobilization to cyber wars of the future—do not paint an entirely clear picture of what makes cyberspace something truly different in global politics. This shift is not universal, or at least to the same degree, for every state. Cyberspace may provide a vehicle for dissent, organization, etc. for every state, but it burdens states that are fixed in terms of physical security and depend on an idealized self-image. States are pressured into explaining the contradictions that arise as a result of their self-image (freedom, openness, transparence, for example) and state-led intrusions into cyberspace. Foreign Policies of the Internet: Surveillance and Disclosure Revisited The 2014 Milton Wolf Seminar brought to bear, and framed well, this theoretical construction of state ontological security in international relations. In particular, many of the presentations dealt with the critical problematic of the balance that must be struck between state self-interest by way of national security and internet diplomacy, global governance, and transparency. Panelists discussed this problematic in various contexts ranging from state censorship of information, international law, and state sovereignty. The internet, and cyberspace more generally, has very real physical characteristics that are often forgotten in discourses of a “borderless digital world” or the metaphor of the internet as a “cloud.” Indeed, the internet is built upon a physical framework, logical building blocks, and interaction (Choucri 2012); and each of these “layers” carries very real political ramifications. State ontological security in cyberspace, as described above, assumes the structural realities of power in international relations regarding the internet, and seeks to elaborate upon how states, beyond concern for their physical security, come to justify surveillance practices on the internet. In this sense, the Milton Wolf Seminar proved invaluable as practitioners and scholars sought to elaborate upon the role of the internet, censorship, privacy, and surveillance in diverse contexts including the national policies and practices of Russia, South Africa, the United States, China, and Britain. Further, the seminar participants elaborated upon shifting or different physical as well as content-layer considerations that need to be taken into account, such as changing modes of internet use, types of surveillance practices, and statecraft in the digital age. The discussion held over the course of the two-day seminar invoked more questions than answers; analysis of such issues has thus far moved, as one seminar participant described, “glacially” alongside the need for internet governance. Thus, the seminar was both timely and a necessary given the salience of internet security, privacy, and surveillance in international politics, along with the perhaps shifting role of the state, and traditional concepts of international politics: state power, sovereignty, and global governance Domestic surveillance is a necessary starting point – surveillance is a critical facet in the historically contingent construction of race under the neoliberal order of Empire. Kundnani, New York University media culture and communication professor, and Kumar, Rutgers University media studies and Middle East studies professor, 2015 [Arun and Deepa, “Race, surveillance, and empire” http://isreview.org/issue/96/racesurveillance-and-empire, accessed 7-11-15, TAP] In what follows, we argue that the debate on national security surveillance that has emerged in the United States since the summer of 2013 is woefully inadequate, due to its failure to place questions of race and empire at the center of its analysis. It is racist ideas that form the basis for the ways national security surveillance is organized and deployed, racist fears that are whipped up to legitimize this surveillance to the American public, and the disproportionately targeted racialized groups that have been most effective in making sense of it and organizing opposition. This is as true today as it has been historically: race and state surveillance are intertwined in the history of US capitalism. Likewise, we argue that the history of national security surveillance in the United States is inseparable from the history of US colonialism and empire. The argument is divided into two parts. The first identifies a number of moments in the history of national security surveillance in North America, tracing its imbrication with race, empire, and capital, from the settler-colonial period through to the neoliberal era. Our focus here is on how race as a sociopolitical category is produced and reproduced historically in the United States through systems of surveillance. We show how throughout the history of the United States the systematic collection of information has been interwoven with mechanisms of racial oppression. From Anglo settler-colonialism, the establishment of the plantation system, the post–Civil War reconstruction era, the US conquest of the Philippines, and the emergence of the national security state in the post- World War II era, to neoliberalism in the post-Civil Rights era, racialized surveillance has enabled the consolidation of capital and empire. It is, however, important to note that the production of the racial “other” at these various moments is conjunctural and heterogenous. That is, the racialization of Native Americans, for instance, during the settler-colonial period took different forms from the racialization of African Americans. Further, the dominant construction of Blackness under slavery is different from the construction of Blackness in the neoliberal era; these ideological shifts are the product of specific historic conditions. In short, empire and capital, at various moments, determine who will be targeted by state surveillance, in what ways, and for how long. In the second part, we turn our attention to the current conjuncture in which the politics of the War on Terror shape national security surveillance practices. The intensive surveillance of Muslim Americans has been carried out by a vast security apparatus that has also been used against dissident movements such as Occupy Wall Street and environmental rights activists, who represent a threat to the neoliberal order. This is not new; the process of targeting dissenters has been a constant feature of American history. For instance, the Alien and Sedition Acts of the late 1790s were passed by the Federalist government against the Jeffersonian sympathizers of the French Revolution. The British hanged Nathan Hale because he spied for Washington’s army in the American Revolution. State surveillance regimes have always sought to monitor and penalize a wide range of dissenters, radicals, and revolutionaries. Race was a factor in some but by no means all of these cases. Our focus here is on the production of racialized “others” as security threats and the ways this helps to stabilize capitalist social relations. Further, the current system of mass surveillance of Muslims is analogous to and overlaps with other systems of racialized security surveillance that feed the mass deportation of immigrants under the Obama administration and that disproportionately target African Americans, contributing to their mass incarceration and what Michelle Alexander refers to as the New Jim Crow.4 We argue that racialized groupings are produced in the very act of collecting information about certain groups deemed as “threats” by the national security state—the Brown terrorist, the Black and Brown drug dealer and user, and the immigrant who threatens to steal jobs. We conclude that “security” has become one of the primary means through which racism is ideologically reproduced in the “post-racial,” neoliberal era. Drawing on W. E. B. Dubois’s notion of the “psychological wage,” we argue that neoliberalism has been legitimized in part through racialized notions of security that offer a new “psychological wage” as compensation for the decline of the social wage and its reallocation to “homeland security.” The 1AC is a prerequisite to the alternative – the 1AC posits a critique of the national security state that is a better starting point and explanation for the current manifestations of the impact of the K than the alternative. Kundnani, New York University media culture and communication professor, and Kumar, Rutgers University media studies and Middle East studies professor, 2015 [Arun and Deepa, “Race, surveillance, and empire” http://isreview.org/issue/96/racesurveillance-and-empire, accessed 7-11-15, TAP] The election of Barack Obama as president in 2008 was said to have ushered in a new “postracial” era, in which racial inequalities were meant to be a thing of the past. African Americans and Muslim Americans placed their hopes in Obama, voting for him in large numbers. But in the so-called post-racial era, the security narrative of hard-working families (coded white) under threat from dangerous racial others has been as powerful as ever. The unprecedented mass deportation of more than two million people during the Obama presidency is one form taken by this post-racial racialized securitization. Over the last two decades, the progressive criminalization of undocumented immigrants has been achieved through the building of a militarized wall between Mexico and the United States, hugely expanding the US border patrol, and programs such as Secure Communities, which enables local police departments to access immigration databases. Secure Communities was introduced in 2008 and stepped up under Obama. It has resulted in migrants being increasingly likely to be profiled, arrested, and imprisoned by local police officers, before being passed to the federal authorities for deportation. Undocumented migrants can no longer have any contact with police officers without risking such outcomes. There is an irony in the way that fears of “illegal immigration” threatening jobs and the public purse have become stand-ins for real anxieties about the neoliberal collapse of the old social contract: the measures that such fears lead to—racialization and criminalization of migrants—themselves serve to strengthen the neoliberal status quo by encouraging a precarious labor market. Capital, after all, does not want to end immigration but to profit from “a vast exploitable labor pool that exists under precarious conditions, that does not enjoy the civil, political and labor rights of citizens and that is disposable through deportation.”66 What brings together these different systems of racial oppression—mass incarceration, mass surveillance, and mass deportation—is a security logic that holds the imperial state as necessary to keeping “American families” (coded white) safe from threats abroad and at home. The ideological work of the last few decades has cultivated not only racial security fears but also an assumption that the security state is necessary to keep “us” safe. In this sense, security has become the new psychological wage to aid the reallocation of the welfare state’s social wage toward homeland security and to win support for empire in the age of neoliberalism. Through the notion of security, social and economic anxieties generated by the unraveling of the Keynesian social compact have been channeled toward the Black or Brown street criminal, welfare recipient, or terrorist . In addition, as Susan Faludi has argued, since 9/11, this homeland in need of security has been symbolized, above all, by the white domestic hearth of the prefeminist fifties, once again threatened by mythical frontier enemies, hidden subversives, and racial aggressors. That this idea of the homeland coincides culturally with “the denigration of capable women, the magnification of manly men, the heightened call for domesticity, the search for and sanctification of helpless girls” points to the ways it is gendered as well as racialized.67 Reformism Contention Radical critiques of the criminal justice system mislocate the proximate cause of racism – reforms are necessary and good from within institutions. - Prison abolition/Rodriguez k alt bad – doesn’t solve racism Perm solves AT: Reform Prisons v Legalize weed Wilkinson, US Court of Appeals 4th Circuit judge, 2014 [J Harvie, former University of Virginia law professor and former DOJ civil rights attorney, Vanderbilt Law Review, “In Defense of American, Criminal Justice” http://www.vanderbiltlawreview.org/content/articles/2014/06/In-Defense-of-AmericanCriminal-Justice.pdf, p.1168-1172, accessed 9-29-14, TAP] One final count in the indictment remains. Can we truly call a system democratic when a very large section of the citizenry—African-Americans—feel oppressed by or excluded from it? Is this a reason to discredit American criminal justice? The reaction to the verdict in the George Zimmerman trial in July 2013—in parts angry, reflective, and resigned—reminded us that many African-Americans feel as though the criminal justice system does not work for them. Washington Post columnist Eugene Robinson argued, “Our society considers young black men to be dangerous, interchangeable, expendable, guilty until proven innocent.”362 Manhattan Institute scholar and New Republic contributor John McWhorter argued that, for African-Americans, “the poisonous relationship between young black men and law enforcement is the prime manifestation of racism in modern America.”363 And President Obama noted that “the African American community is looking at this issue through a set of experiences and history that doesn’t go away,” one wrapped up in “a history of racial disparities in the application of our criminal law.”364 There is something to these criticisms. Americans have tried to address them over the years by requiring objective, race-neutral justifications for government actions within the criminal justice system. We have, for example, required that the jury venire be composed of a fair cross-section of the community,365 and in Batson v. Kentucky,366 the Supreme Court outlawed the use of peremptory challenges of jurors based upon their race. We can insist that objective criteria support stop and frisks. And we can focus on racial discrepancies in criminal-law enforcement—which may lead, for example, to four times as many marijuana arrests for black Americans as white Americans, despite similar rates of use.367 But efforts such as these won’t solve our problems altogether. This is because the story is more complicated than simply a criminal justice system that has failed to win the trust and confidence of many in the African-American community. The problem of racial equality and criminal justice is one of “painful complexity.”368 We can acknowledge that we have not yet reached our goal of race neutrality in the dispensation of justice while acknowledging also that this alone does not account for the racial makeup of our prisons and halfway houses . Then– New York Mayor Michael Bloomberg stated, “Ninety percent of all people killed in our city—and 90 percent of all those who commit the murders and other violent crimes—are black and Hispanic.”369 That is the great double-edged sword. It understandably leads to more stops and more arrests in high-crime areas. It understandably leads to more convictions of those of whatever race who commit the crimes. But it also leads to understandable anger and resentment on the part of disadvantaged young black males who want to make a decent go of American life, only to find themselves the object of recurrent false suspicion and repeated frisks. The solution to the problem of race and criminal justice is not a total overhaul of the system. That just renders the criminal justice system the scapegoat for a much larger set of social problems. The criminal justice system feels the effects of those problems; it does not cause them. Drug and gun crimes are not any less a blight upon society because of the racial makeup of the offenders; indeed, as Robinson noted, “[N]owhere will you find citizens more supportive of tough law-and-order policies than in poor, high-crime neighborhoods.”370 Our criminal justice system rightly aims to reduce dangerous behavior, and the beneficiaries of success in that endeavor may be those less advantaged citizens for whom basic safety will make for greater opportunity, not to mention better prospects for a brighter life. To cast ceaseless blame on America’s criminal justice system is to ignore the enormity of the problems it has been asked to solve. It only diverts attention from the larger ways in which America has failed its underclass. As Michael Gerson recently noted, “The problem of African American boys and young men is a complex mix of lingering racial prejudice, urban economic dislocation, collapsing family structure, failing schools and sick, atomized communities.”371 To chastise criminal justice when many levers of upward mobility are so compromised is an inversion of priorities. A complete “fix” of what the critics allege ails criminal justice will do nothing to restore shattered family structures, improve failing schools, impart necessary job skills, restore religious and community support groups, or provide meaningful alternatives in deprived neighborhoods to the gangs and drug rings that steer young people toward lifelong addictions and lives of crime. Society doesn’t create opportunity by sacrificing the basic social need for order. To the contrary, improvements in communities and institutions will only take root in the kind of safe environment that, at its best, a strong criminal justice system can provide. And when we provide opportunity, we in turn reduce the pressure on the criminal justice system and lessen the monumental task that lack of opportunity for the poorest Americans has left it to perform. How a society chooses to balance justice and safety with rights and liberties will invariably be the subject of vigorous debate. Our criminal justice system is no exception. Many good and intelligent people will disagree passionately about the contours of our criminal law. That is all to the good. We should not grow complacent in both for the sake of individual defendants and for the rule of law itself. the face of particular problems, But instead of engaging in a constructive debate about the American approach to criminal justice, legal elites largely have condemned the entire enterprise. The system, we are told, is broken, and only sweeping reforms imposed from on high can save it. But the rhetoric that fuels the wholesale assault upon the system not only will fail to achieve any meaningful change, it obscures the many strengths of our institutions. By focusing so much on what is wrong, we inevitably forget what is right. The terms of engagement must change. My call is not for scholars to whitewash our system’s failings but to realize the picture is far more nuanced and complex than they have presented it. Given the volume of matters it is asked to address and immensity of the task it is asked to perform, our criminal justice system functions rather well. It is both unrealistic and uncharitable to portray the system as an engine of oppression and injustice. Ironically, many of the features that critics claim operate one-sidedly against defendants often work to their benefit. The American criminal justice system strikes a valuable front-end note. It strikes difficult balances between protecting the innocent and convicting the guilty, between procedural protections and administrative realities. It rightly allows these contestable choices to be made democratically, but only to a point. Such qualities are hardly the hallmarks of a failed system. Indeed, those who have been among the most persistent critics of the criminal justice system were among the first to call for its utilization in the aftermath of the September 11th terrorist attacks.372 And since that time, the refrain has often been that acts of terrorism are crimes that should be dealt with in the customary way through enforcement of federal criminal law.373 I recognize that this plea for criminal trials does not constitute an acknowledgment of the system’s perfection, but it does indicate that the system imparts a legitimacy for the deprivation of liberty that other routes of trying suspected terrorists may lack. This is no place to explore the complicated question of whether alleged terrorism is more aptly regarded as a criminal offense or as an act of war. Separation of powers concerns and the need for action to prevent mass casualties make the question an exceptionally complicated one. I note only the irony that many who reject the considerable virtues of the American criminal justice system are at least prepared to look upon it as a preferred solution when the values of liberty and security are in epochal tension. To be sure, there is plenty of room for reform, and all parts of the legal profession should head for the front lines. But let us not forget our system’s virtues as we seek to correct its vices. Otherwise, any legitimate concerns will be lost in the din of diatribe. We have gone too long without a degree of balance or moderation in our assessment of the American criminal justice system. It is time we gave our institutions a fair trial. Reformism is effective and brings the revolution closer – intellectual idealism is a privileged mode of thought that fails to eradicate racism. Delgado, University of Alabama minority scholar and chair of law, 2009 [Richard, in Arguing about Law, “Does Critical Legal Studies Have What Minorities Want” http://books.google.com/books?id=g75cAgAAQBAJ&pg=PA1&lpg=PA1&dq=arguing+about+law &source=bl&ots=8q7fJpE0h&sig=Y2nyM2lsR2roG3IEFPisRXGs3Q8&hl=en&sa=X&ei=zfooVJrlOo6gyASRmYDwCw&ved= 0CEsQ6AEwBw#v=onepage&q=imperialistic&f=false, p.589-90, accessed 9-29-14, TAP] 2. The CLS critique of piecemeal reform Critical scholars reject the idea of piecemeal reform. Incremental change, they argue, merely postpones the wholesale reformation that must occur to create a decent society. Even worse, an unfair social system survives by using piecemeal reform to disguise and legitimize oppression. Those who control the system weaken resistance by pointing to the occasional concession to, or periodic court victory of, a black plaintiff or worker as evidence that the system is fair and just. In fact, Crits believe that teaching the common law or using the case method in law school is a disguised means of preaching incrementalism and thereby maintaining the current power structure.“ To avoid this, CLS scholars urge law professors to abandon the case method, give up the effort to find rationality and order in the case law, and teach in an unabashedly political fashion. The CLS critique of piecemeal reform is familiar, imperialistic and wrong. Minorities know from bitter experience that occasional court victories do not mean the Promised Land is at hand. The critique is imperialistic in that it tells minorities and other oppressed peoples how they should interpret events affecting them. A court order directing a housing authority to disburse funds for heating in subsidized housing may postpone the revolution, or it may not. In the meantime, the order keeps a number of poor families warm. This may mean more to them than it does to a comfortable academic working in a warm office. It smacks of paternalism to assert that the possibility of revolution later outweighs the certainty of heat now, unless there is evidence for that possibility. The Crits do not offer such evidence. Indeed, some incremental changes may bring revolutionary changes closer, not push them further away. Not all small reforms induce complacency; some may whet the appetite for further combat. The welfare family may hold a tenants‘ union meeting in their heated living room. CLS scholars‘ critique of piecemeal reform often misses these possibilities, and neglects the question of whether total change, when it comes, will be what we want. 3. CLS’ idealism The CLS program is also idealistic.45 CLS scholars’ idealism transforms social reality into a mental construct.46 Facts become intelligible only through the categories of thought that we bring to experience. Crits argue that the principle impediments to achieving an ideal society are intellectual. People are imprisoned by a destructive system of mental categories that blocks any vision of a better world.47 Liberal-capitalist ideology so shackles individuals that they willingly accept a truncated existence and believe it to be the best available. Changing the world requires primarily that we begin to think about it differently.48 To help break the mental chains and clear the way for the creation of a new and better world, Crits practice “trashing” – a process by which law and social structures are shown to be contingent, inconsistent and irrationally supportive of the status quo without good reason.49 CLS scholars’ idealism has a familiar ring to minority ears. We cannot help but be reminded of those fundamentalist preachers who have assured us that our lot will only improve once we “see the light” and are “saved.” Are the chains really mental? They may be so for members of privileged groups. They are much less so for minorities. Imagine that the Crit’s trashing program succeeded and that all laws were repealed. Would our lot improve? That proposition is open to serious doubt. The forces that hold us back are not largely mental, legal, or even political. What holds us back is, simply, racism – the myriad of insults, threats, indifference, and other “microaggressions” to which we are continually exposed.50 Because the Crits are intellectuals, they assign a large role to reason and ideology. Yet reason and ideology do not explain all evil. Telling an individual that he or she harbors racism will not make it go away; telling a black person that a rebuff was racially motivated will not ease its sting. Racism will not go away simply because Crits show that legalisms are indeterminate, that rights are alienating and legitimizing, and that law is a reflection of the interests of the ruling class. Whatever utility these concepts may have in other settings and in attempting to explain the angst of CLS members,51 they have limited application in helping to understand, much less cure, racism. Revolution requires a strategy – reforms pave the way to revolution – creating a dichotomy between reform and revolution fails to cause systemic change. Wray, International Socialist Group, 4-14-14 [Ben, “The case for revolutionary reforms” http://internationalsocialist.org.uk/index.php/2014/04/the-case-for-revolutionary-reforms/, accessed 9-29-14, TAP] But as I’ve discussed in the previous five parts of this series, getting from where we are to a revolutionary transformation that overthrows the dominant property relations of the capitalist economy and replaces them with social relations based on democratic control of the world’s resources is not as simple as declaring our desire for it to be so. I saw a petition on change.org the other day proposing the overthrow of capitalism. If one million people signed that petition and one million people signed a further petition to introduce full collective bargaining rights for trade-unions in the UK, which one would move us closer to the overthrow of capitalism? I wager the latter. Whilst having an end goal in sight is important, most people don’t change their thinking about the world based on bold visions of what could be done at some point in the future: they change their ideas based on evidence from their material lives which points to the inadequacy or irrationality of the status quo. In other words, we need to have ideas that build upon people’s lived experience of capitalism, and since that it is within the framework of a representative democracy system, we need ideas based around proposals for reforms. At the same time those reforms have to help rather than hinder a move to more revolutionary transformation that challenges the very core of the capitalist system. The dialectic of reform and revolution What we need, therefore, is a strategy of revolutionary reforms . Such a notion would appear as a contradiction in terms to many who identify as reformists or revolutionaries and see the two as dichotomous, but there is no reason why this should be the case. Indeed, history has shown that revolutionary transformations have always happened as a dialectical interaction between rapid, revolutionary movements and more institutional, reform-based challenges. Even the revolutionary part of that dialectic has always been motivated by the immediate needs of the participants involved – ‘land, bread and peace’ being the first half of the slogan of the Russian Revolution. What does a strategy of ‘revolutionary reforms’ entail? Ed Rooksby explains that it is a political strategy that builds towards revolutionary change by using reforms to ‘push up against the limits’ of the ‘logic of capitalism’ in practice: “At first these “feasible objectives” will be limited to reforms within capitalism—or at least to measures which, from the standpoint of a more or less reformist working class consciousness, appear to be legitimate and achievable within the system, but which may actually run counter to the logic of capitalism and start to push up against its limits. As the working class engages in struggle, however, the anti-capitalist implications of its needs and aspirations are gradually revealed. At the same time, through its experience of struggle for reform, the working class learns about its capacity for “self-management, initiative and collective decision” and can have a “foretaste of what emancipation means”. In this way struggle for reform helps prepare the class psychologically, ideologically and materially for revolution.” The late Daniel Bensaid expressed this argument through the lens of the history of the socialist movement: “In reality all sides in the controversy agree on the fundamental points inspired by The Coming Catastrophe (Lenin’s pamphlet of the summer of 1917) and the Transitional Programme of the Fourth International (inspired by Trotsky in 1937): the need for transitional demands, the politics of alliances (the united front), the logic of hegemony and on the dialectic (not antinomy) between reform and revolution. We are therefore against the idea of separating an (‘anti-neoliberal’) minimum programme and an (anti-capitalist) ‘maximum’ programme. We remain convinced that a consistent anti-neoliberalism leads to anti-capitalism and that the two are interlinked by the dynamic of struggle.” So revolutionary reforms means a policy agenda that, as Alberto Toscano has put it, “at one and the same time make concrete gains within capitalism which permits further movement against capitalism”. The Italian marxist Antonio Gramsci described this approach as a ‘war of positon’. Racial progress has occurred though legal change and more is still possible – reject monolithic theories of racism because they doom resistance to be selffulfilling and lack empirical validity. Omi, University of California Berkeley ethnic studies professor, and Winant, University of California Santa Barbara sociology professor, 2013 [Michael and Howard, Ethnic and Racial Studies Volume 36, Issue 6, p. 961-973, “Resistance is futile?: a response to Feagin and Elias” Social Text, accessed 9-29-14, TAP] In Feagin and Elias's account, white racist rule in the USA appears unalterable and permanent. There is little sense that the ‘white racial frame’ evoked by systemic racism theory changes in significant ways over historical time. They dismiss important rearrangements and reforms as merely ‘a distraction from more ingrained structural oppressions and deep lying inequalities that continue to define US society’ (Feagin and Elias 2012, p. 21). Feagin and Elias use a concept they call ‘surface flexibility’ to argue that white elites frame racial realities in ways that suggest change, but are merely engineered to reinforce the underlying structure of racial oppression. Feagin and Elias say the phrase ‘racial democracy’ is an oxymoron – a word defined in the dictionary as a figure of speech that combines contradictory terms. If they mean the USA is a contradictory and incomplete democracy in respect to race and racism issues, we agree. If they mean that people of colour have no democratic rights or political power in the USA, we disagree. The USA is a racially despotic country in many ways, but in our also in many respects a racial democracy, capable of being influenced towards more or less inclusive and redistributive economic policies, social policies, or for that matter, imperial policies. What is distinctive about our own epoch in the USA (post-Second World War to the present) with respect to race and view it is racism? Over the past decades there has been a steady drumbeat of efforts to contain and neutralize civil rights, to restrict racial democracy, and to maintain or even increase racial inequality. Racial disparities in different institutional sites – employment, health, education – persist and in many cases have increased. Indeed, the post-2008 period has seen a dramatic increase in racial inequality. The subprime home mortgage crisis, for example, was a major racial event. Black and brown people were disproportionately affected by predatory lending practices; many lost their homes as a result; race-based wealth disparities widened tremendously. It would be easy to conclude, as Feagin and Elias do, that white racial dominance has been continuous and unchanging throughout US history. But such a perspective misses the dramatic twists and turns in racial politics that have occurred since the Second World War and the civil rights era. Feagin and Elias claim that we overly inflate the significance of the changes wrought by the civil rights movement, and that we ‘overlook the serious reversals of racial justice and persistence of huge racial inequalities’ (Feagin and Elias 2012, p. 21) that followed in its wake. We do not. In Racial Formation we wrote about ‘racial reaction’ in a chapter of that name, and elsewhere in the book as well. Feagin and Elias devote little attention to our arguments there; perhaps because they are in substantial agreement with us. While we argue that the right wing was able to ‘rearticulate’ race and racism issues to roll back some of the gains of the civil rights movement, we also believe that there are limits to what the right could achieve in the post-civil rights political landscape. So we agree that the present prospects for racial justice are demoralizing at best. But we do not think that is the whole story. US racial conditions have changed over the post-Second World War period, in ways that Feagin and Elias tend to downplay or neglect. Some of the major reforms of the 1960s have proved irreversible; they have set powerful democratic forces in motion. These racial (trans)formations were the results of unprecedented political mobilizations, led by the black movement, but not confined to blacks alone. Consider the desegregation of the armed forces, as well as key civil rights movement victories of the 1960s: the Voting Rights Act, the Immigration and Naturalization Act (Hart- Celler), as well as important court decisions like Loving v. Virginia that declared anti-miscegenation laws unconstitutional. While we have the greatest respect for the late Derrick Bell, we do not believe that his ‘interest convergence hypothesis’ effectively explains all these developments. How does Lyndon Johnson's famous (and possibly apocryphal) lament upon signing the Civil Rights Act on 2 July 1964 – ‘We have lost the South for a generation’ – count as ‘convergence’? The US racial regime has been transformed in significant ways. As Antonio Gramsci argues, hegemony proceeds through the incorporation of opposition (Gramsci 1971, p. 182). The civil rights reforms can be seen as a classic example of this process; here the US racial regime – under movement pressure – was exercising its hegemony. But Gramsci insists that such reforms – which he calls ‘passive revolutions’ – cannot be merely symbolic if they are to be effective: oppositions must win real gains in the process. Once again, we are in the realm of politics, not absolute rule. So yes, we think there were important if partial victories that shifted the racial state and transformed the significance of race in everyday life. And yes, we think that further victories can take place both on the broad terrain of the state and on the more immediate level of social interaction: in daily interaction, in the human psyche and across civil society . Indeed we have argued that in many ways the most important accomplishment of the anti-racist movement of the 1960s in the USA was the politicization of the social. In the USA and indeed around the globe, race-based movements demanded not only the inclusion of racially defined ‘others’ and the democratization of structurally racist societies, but also the recognition and validation by both the state and civil society of racially-defined experience and identity. These demands broadened and deepened democracy itself. They facilitated not only the democratic gains made in the USA by the black movement and its allies, but also the political advances towards equality, social justice and inclusion accomplished by other ‘new social movements’: secondwave feminism, gay liberation, and the environmentalist and anti-war movements among others. By no means do we think that the post-war movement upsurge was an unmitigated success. Far from it: all the new social movements were subject to the same ‘rearticulation’ (Laclau and Mouffe 2001, p. xii) that produced the racial ideology of ‘colourblindness’ and its variants ; indeed all these movements confronted their mirror images in the mobilizations that arose from the political right to counter them. Yet even their incorporation and containment, even their confrontations with the various ‘backlash’ phenomena of the past few decades, even the need to develop the highly contradictory ideology of ‘colourblindness’, reveal the transformative character of the ‘politicization of the social’ . While it is not possible here to explore so extensive a subject, it is worth noting that it was the long-delayed eruption of racial subjectivity and self-awareness into the mainstream political arena that set off this transformation, shaping both the democratic and antidemocratic social movements that are evident in US politics today. What are the political implications of contemporary racial trends? Feagin and Elias's use of racial categories can be imprecise. This is not their problem alone; anyone writing about race and racism needs to frame terms with care and precision, and we undoubtedly get fuzzy too from time to time. The absence of a careful approach leads to ‘racial lumping’ and essentialisms of various kinds. This imprecision is heightened in polemic. In the Feagin and Elias essay the term ‘whites’ at times refers to all whites, white elites, ‘dominant white actors’ and very exceptionally, anti-racist whites, a category in which we presume they would place themselves. Although the terms ‘black’, ‘African American’ and ‘Latino’ appear, the term ‘people of colour’ is emphasized, often in direct substitution for black reference points. In the USA today it is important not to frame race in a bipolar manner. The black/white paradigm made more sense in the past than it does in the twenty-first century. The racial make-up of the nation has now changed dramatically. Since the passage of the Immigration Reform Act of 1965, the USA has become more ‘coloured’. A ‘majority–minority’ national demographic shift is well underway. Predicted to arrive by the mid-twenty-first century, the numerical eclipse of the white population is already in evidence locally and regionally. In California, for example, non-Hispanic whites constitute only 39.7 per cent of the state's population. While the decline in the white population cannot be correlated with any decline of white racial dominance, the dawning and deepening of racial multipolarity calls into question a sometimes implicit and sometimes explicit black/white racial framework that is evident in Feagin and Elias's essay. Shifting racial demographics and identities also raise general questions of race and racism in new ways that the ‘systemic racism’ approach is not prepared to explain.3 Class questions and issues of panethnicizing trends, for example, call into question what we mean by race, racial identity and race consciousness. No racially defined group is even remotely uniform; groups that we so glibly refer to as Asian American or Latino are particularly heterogeneous. Some have achieved or exceeded socio-economic parity with whites, while others are subject to what we might call ‘engineered poverty’ in sweatshops, dirty and dangerous labour settings, or prisons. Tensions within panethnicized racial groups are notably present, and conflicts between racially defined groups (‘black/brown’ conflict, for example) are evident in both urban and rural settings. A substantial current of social scientific analysis now argues that Asians and Latinos are the ‘new white ethnics’, able to ‘work toward whiteness’4 at least in part, and that the black/white bipolarity retains its distinct and foundational qualities as the mainstay of US racism (Alba and Nee 2005; Perlmann 2005; Portes and Rumbaut 2006; Waters, Ueda and Marrow 2007). We question that argument in light of the massive demographic shifts taking place in the USA . Globalization, climate change and above all neoliberalism on a global scale, all drive migration. The country's economic capacity to absorb enormous numbers of immigrants, low-wage workers and their families (including a new, globally based and very female, servant class) without generating the sort of established subaltern groups we associate with the terms race and racism, may be more limited than it was when the ‘whitening’ of Europeans took place in the nineteenth and twentieth centuries. In other words this argument's key precedent, the absorption of white immigrants ‘of a different color’ (Jacobson 1998), may no longer apply. Indeed, we might think of the assimilationist model itself as a general theory of immigrant incorporation that was based on a historically specific case study – one that might not hold for, or be replicated by, subsequent big waves of immigration. Feagin and Elias's systemic racism model, while offering numerous important insights, does not inform concrete analysis of these issues. It is important going forward to understand how groups are differentially racialized and relatively positioned in the US racial hierarchy: once again racism must be seen as a shifting racial project. This has important consequences, not only with respect to emerging patterns of inequality, but also in regard to the degree of power available to different racial actors to define, shape or contest the existing racial landscape. Attention to such matters is largely absent in Feagin and Elias's account. In their view racially identified groups are located in strict reference to the dominant ‘white racial frame’, hammered into place, so to speak. As a consequence, they fail to examine how racially subordinate groups interact and influence each others’ boundaries, conditions and practices. Because they offer so little specific analysis of Asian American, Latino or Native American racial issues, the reader finds her/himself once again in the land (real or imaginary, depending on your racial politics) of bipolar US racial dynamics, in which whites and blacks play the leading roles, and other racially identified groups – as well as those ambiguously identified, such as Middle Eastern and South Asian Americans (MEASA) – play at best supporting roles, and are sometimes cast as extras or left out of the picture entirely. We still want to acknowledge that blacks have been catching hell and have borne the brunt of the racist reaction of the past several decades. For example, we agree with Feagin and Elias's critique of the reactionary politics of incarceration in the USA. The ‘new Jim Crow’ (Alexander 2012) or even the ‘new slavery’ that the present system practises is something that was just in its beginning stages when we were writing Racial Formation. It is now recognized as a national and indeed global scandal. How is it to be understood? Of course there are substantial debates on this topic, notably about the nature of the ‘prison-industrial complex’ (Davis 2003, p. 3) and the social and cultural effects of mass incarceration along racial lines. But beyond Feagin and Elias's denunciation of the ferocious white racism that is operating here, deeper political implications are worth considering. As Alexander (2012), Mauer (2006), Manza and Uggen (2008) and movement groups like Critical Resistance and the Ella Baker Center argue, the upsurge over recent decades in incarceration rates for black (and brown) men expresses the fear-based, law-and-order appeals that have shaped US racial politics since the rise of Nixonland (Perlstein 2008) and the ‘Southern strategy’. Perhaps even more central, racial repression aims at restricting the increasing impact of voters of colour in a demographically shifting electorate. There is a lot more to say about this, but for the present two key points stand out: first, it is not an area where Feagin and Elias and we have any sharp disagreement, and second, for all the horrors and injustices that the ‘new Jim Crow’ represents, incarceration, profiling and similar practices remain political issues. These practices and policies are not ineluctable and unalterable dimensions of the US racial regime. There have been previous waves of reform in these areas. They can be transformed again by mass mobilization, electoral shifts and so on. In other words, resistance is not futile. Speaking of electoral shifts and the formal political arena, how should President Barack Obama be politically situated in this discussion? How do Feagin and Elias explain Obama? Quite amazingly, his name does not appear in their essay. Is he a mere token, an ‘oreo’, a shill for Wall Street? Or does Obama represent a new development in US politics, a black leader of a mass, multiracial party that for sheer demographic reasons alone might eventually triumph over the white people's party, the Republicans? If the President is neither the white man's token nor Neo, the One,5 then once again we are in the world of politics: neither the near-total white despotism depicted by Feagin and Elias, nor a racially inclusive democracy. President Obama continues to enjoy widespread black support, although it is clear that he has not protected blacks against their greatest cumulative loss of wealth in history. He has not explicitly criticized the glaring racial bias in the US carceral system. He has not intervened in conflicts over workers’ rights – particularly in the public sector where many blacks and other people of colour are concentrated. He has not intervened to halt or slow foreclosures, except in ways that were largely symbolic. Workers and lower-middle-class people were the hardest hit by the great recession and the subprime home mortgage crisis, with black families faring worst, and Latinos close behind (Rugh and Massey 2010); Obama has not defended them. Many writers have explained Obama's centrism and unwillingness to raise the issue of race as functions of white racism (Sugrue 2010). The black community – and other communities of colour as well – remains politically divided. While black folk have taken the hardest blows from the reactionary and racist regime that has mostly dominated US politics since Reagan (if not since Nixon), no united black movement has succeeded the deaths of Malcolm and Martin. Although there is always important political activity underway, a relatively large and fairly conservative black middle class, a ‘black bourgeoisie’ in Frazier's (1957) terms, has generally maintained its position since the end of the civil rights era. Largely based in the public sector, and including a generally centrist business class as well, this stratum has continued to play the role that Frazier – and before him, Charles S. Johnson. William Lloyd Warner, Alison Davis and other scholars – identified: vacillation between the white elite and the black masses. Roughly similar patterns operate in Latino communities as well, where the ‘working towards whiteness’ framework coexists with a substantial amount of exclusion and super-exploitation. Alongside class issues in communities of colour, there are significant gender issues. The disappearance of blue-collar work, combined with the assault by the criminal justice system – chiefly profiling by the police (‘stop and frisk’) and imprisonment, have both unduly targeted and victimized black and brown men, especially youth. Women of colour are also targeted, especially by violence, discrimination and assaults on their reproductive rights (Harris-Perry 2011); profiling is everywhere (Glover 2009). Here again we are in the realm of racial politics. Debate proceeds in the black community on Obama's credibilty, with Cornel West and Tavis Smiley leading the critics. But it seems safe to say that in North Philly, Inglewood or Atlanta's Lakewood section, the president remains highly popular. Latino support for Obama remains high as well. Feagin and Elias need to clarify their views on black and brown political judgement. Is it attuned to political realities or has it been captured by the white racial frame? Is Obama's election of no importance? In conclusion, do Feagin and Elias really believe that white power is so complete, so extensive, so ‘sutured’ (as Laclau and Mouffe might say) as they suggest here? Do they mean to suggest, in Borg-fashion, that ‘resistance is futile?’ This seems to be the underlying political logic of the ‘systemic racism’ approach, perhaps unintentionally so. Is white racism so ubiquitous that no meaningful political challenge can be mounted against it ? Are black and brown folk (yellow and red people, and also others unclassifiable under the alwaysabsurd colour categories) utterly supine, duped, abject, unable to exert any political pressure? Is such a view of race and racism even recognizable in the USA of 2012? And is that a responsible political position to be advocating? Is this what we want to teach our students of colour? Or our white students for that matter? We suspect that if pressed, Feagin and Elias would concur with our judgement that racial conflict, both within (and against) the state and in everyday life, is a fundamentally political process. We think that they would also accept our claim that the ongoing political realities of race provide extensive evidence that people of colour in the USA are not so powerless, and that whites are not so omnipotent, as Feagin and Elias's analysis suggests them to be. Racial formation theory allows us to see that there are contradictions in racial oppression. The racial formation white racism is unstable and constantly challenged, from the national and indeed global level down to the personal and intra-psychic conflicts that we all experience, no matter what our racial identity might be. While racism – largely white – continues to flourish, approach reveals that it is not monolithic . Yes, there have been enormous increases in racial inequality in recent years. But movement-based anti-racist opposition continues, and sometimes scores victories. Challenges to white racism continue both within the state and in civil society . Although largely and properly led by people of colour, anti-racist movements also incorporate whites such as Feagin and Elias themselves. Movements may experience setbacks, the reforms for which they fought may be revealed as inadequate, and indeed their leaders may be co-opted or even eliminated, but racial subjectivity and self-awareness, unresolved and conflictual both within the individual psyche and the body politic, abides. Resistance is not futile . Pessimism fails – it foregoes legitimate reforms, creates defeatism, crushes movements, and results in pursuing simplistic and counter-productive proposals. Kennedy, Harvard University law profeesor, 2012 [Randall, “Race, Crime, and the Law” http://books.google.com/books?id=TE3cE4UnghgC&pg=PA388&lpg=PA388&dq=kennedy,+%22T rue,+it+is+sometimes+genuinely+difficult+to+determine+an+appropriate+remedial+response% 22&source=bl&ots=4eTFbno1dG&sig=yox9NLgt7uA_pAeDhrB7FOPmCzU&hl=en&sa=X&ei=kIop VKuSC81sQTD14CgDQ&ved=0CB4Q6AEwAA#v=onepage&q=kennedy%2C%20%22True%2C%20it%20is% 20sometimes%20genuinely%20difficult%20to%20determine%20an%20appropriate%20remedial %20response%22&f=false, p.388-9, accessed 9-29-14, TAP] True, it is sometimes genuinely difficult to determine an appropriate remedial response. The proper way to address that difficulty, however, is to acknowledge and grapple with it, not bury it beneath unbelievable assertions that, in fact, no real problem exists. Whitewashing racial wrongs (especially while simultaneously proclaiming that courts are doing everything reasonably possible to combat racially invidious government action) corrupts officials and jades onlookers, nourishing simplistic, despairing, and defeatist critiques of the law that are profoundly destructive. The second impression that I want to leave with readers should serve as an antidote to these overwrought, defeatist critiques by acknowledging that the administration of criminal law has changed substantially for the better over the past half century and that there is reason to believe that, properly guided, it can be improved even more. Today there are more formal and informal protections against racial bias than ever before, both in terms of the protections accorded to blacks against criminality and the treatment accorded to black suspects, defendants, and convicts. That deficiencies, large deficiencies, remain is clear. But comparing racial policies today to those that prevailed in 1940 or 1960 or even 1980 should expose the fallacy of asserting that nothing substantial has been changed for the better. This point is worth stressing because of the prevalence and prominence of pessimistic thinking about the race question in American life. Some commentators maintain, in all seriousness, that there has been no significant improvement in the overall fortunes of black Americans during the past half century, that advances that appear to have been made are merely cosmetic, and that the United States is doomed to remain a pigmentocracy. This pessimistic strain often turns paranoid and apocalyptic in commentary about the administration of criminal law. It is profoundly misleading, however, to focus exclusively on the ugliest aspects of the American legal order. Doing so conceals real achievements: the Reconstruction Constitutional Amendments, the Reconstruction civil rights laws, Strauder v. Alabama, Dempsey v. Moore, Brown v. Mississippi, Powell v. Alabama, Norris v. Alabama, Batson v. Kentucky, the resuscitation of Reconstruction by the civil rights movement, the changing demographics of the bench, bar, and police departments—in sum, the stigmatization (albeit incomplete) of invidious racial bias. Neglecting these achievements robs them of support. Recent sharp attacks upon basic guarantees bequeathed by the New Deal ought to put everyone on notice of the perils of permitting social accomplishments to lose one-dimensional condemnations of the racial situation in America renders attractive certain subversive proposals that are, given actual conditions, foolish, counterproductive , and immoral. I think here in particular of the call for racially selective jury their rightful stature in the public's estimation. Moreover, nullification. Such proposals should be openly challenged on the grounds that they fundamentally misperceive the racial realities of American life. The law is problematic but it is a lived reality –the only effective method is redeploying institutional logic against itself. Crenshaw, University of California Los Angeles law professor, 1988 [Kimberle, Harvard law review, “RACE, REFORM, AND RETRENCHMENT: TRANSFORMATION AND LEGITIMATION IN ANTIDISCRIMINATION LAW” http://www.jstor.org/stable/pdfplus/1341398.pdf?acceptTC=true&jpdConfirm=true, JSTOR, p.1366-8, accessed 9-29-14, TAP] The Critics' product is of limited utility to Blacks in its present form. The implications for Blacks of trashing liberal legal ideology are troubling, even though it may be proper to assail belief structures that obscure liberating possibilities. Trashing legal ideology seems to tell us repeatedly what has already been established -- that legal discourse is unstable and relatively indeterminate. Furthermore, trashing offers no idea of how to avoid the negative consequences of engaging in reformist discourse or how to work around such consequences. Even if we imagine the wrong world when we think in terms of legal discourse, we must nevertheless exist in a present world where legal protection has at times been a blessing -- albeit a mixed one . The fundamental problem is that, although Critics criticize law because it functions to legitimate existing institutional arrangements, it is precisely this legitimating function that has made law receptive to certain demands in this area. The Critical emphasis on deconstruction as the vehicle for liberation leads to the conclusion that engaging in legal discourse should be avoided because it reinforces not only the discourse itself but also the society and the world that it embodies. Yet Critics offer little beyond this observation. Their focus on delegitimating rights rhetoric seems to suggest that, once rights rhetoric has been discarded, there exists a more productive strategy for change, one which does not reinforce existing patterns of domination. Unfortunately, no such strategy has yet been articulated, and it is difficult to imagine that racial minorities will ever be able to discover one. As Frances Fox Piven and Richard Cloward point out in their [*1367] excellent account of the civil rights movement, popular struggles are a reflection of institutionally determined logic and a People can only demand change in ways that reflect the logic of the institutions that they are challenging. 138 Demands for change that do not reflect the challenge to that logic. 137 institutional logic -- that is, demands that do not engage and subsequently reinforce the dominant ideology -- will probably be ineffective . 139 The possibility for ideological change is created through the very process of legitimation, which is triggered by crisis. Powerless people can sometimes trigger such a crisis by challenging an institution internally, that is, by using its own logic against it. 140 Such crisis occurs when powerless people force open and politicize a contradiction between the dominant ideology and their reality. The political consequences [*1368] of maintaining the contradictions may sometimes force an adjustment -- an attempt to close the gap or to make things appear fair. 141 Yet, because the adjustment is triggered by the political consequences of the contradiction, circumstances will be adjusted only to the extent necessary to close the apparent contradiction. This approach to understanding legitimation and change is applicable to the civil rights movement. Because Blacks were challenging their exclusion from political society, the only claims that were likely to achieve recognition were those that reflected American society's institutional logic: legal rights ideology. Articulating their formal demands through legal rights ideology, civil rights protestors exposed a series of contradictions -- the most important being the promised privileges of American citizenship and the practice of absolute racial subordination. Rather than using the contradictions to suggest that American citizenship was itself illegitimate or false, civil rights protestors proceeded as if American citizenship were real, and demanded to exercise the “rights” that citizenship entailed. By seeking to restructure reality to reflect American mythology, Blacks relied upon and ultimately benefited from politically inspired efforts to resolve the contradictions by granting formal rights. Although it is the need to maintain legitimacy that presents powerless groups with the opportunity to wrest concessions from the dominant order, it is the very accomplishment of legitimacy that forecloses greater possibilities. In sum, the potential for change is both created and limited by legitimation . Institutional macropolitical policy engagement is vital to solve – any alternative results in failure to actualize change, cooption, and moot activism Lobel, University of San Diego assistant law professor, 2007 [Orly, Harvard law review, “THE PARADOX OF EXTRALEGAL ACTIVISM: CRITICAL LEGAL CONSCIOUSNESS AND TRANSFORMATIVE POLITICS” http://cdn.harvardlawreview.org/wpcontent/uploads/pdfs/lobel.pdf, p.983-7, accessed 9-29-14, TAP] Both the practical failures and the fallacy of rigid boundaries generated by extralegal activism rhetoric permit us to broaden our inquiry to the underlying assumptions of current proposals regarding transformative politics — that is, attempts to produce meaningful changes in the political and socioeconomic landscapes. The suggested alternatives produce a new image of social and political action. This vision rejects a shared theory of social reform, rejects formal programmatic agendas, and embraces a multiplicity of forms and practices. Thus, it is described in such terms as a plan of no plan,211 “a project of pro-jects,”212 “anti-theory theory,”213 politics rather than goals,214 presence rather than power,215 “practice over theory,”216 and chaos and openness over order and formality. As a result, the contemporary message rarely includes a comprehensive vision of common social claims, but rather engages in the description of fragmented efforts. As Professor Joel Handler argues, the commonality of struggle and social vision that existed during the civil rights movement has disappeared.217 There is no unifying discourse or set of values, but rather an aversion to any metanarrative and a resignation from theory. Professor Handler warns that this move away from grand narratives is selfdefeating precisely because only certain parts of the political spectrum have accepted this new stance: “[T]he opposition is not playing that game . . . . [E]veryone else is operating as if there were Grand Narratives . . . .”218 Intertwined with the resignation from law and policy, the new bromide of “neither left nor right” has become axiomatic only for some.219 The contemporary critical legal consciousness informs the scholarship of those who are interested in progressive social activism, but less so that of those who are interested, for example, in a more competitive securities market. Indeed, an interesting recent development has been the rise of “conservative public interest lawyer[ing].”220 Although “public interest law” was originally associated exclusively with liberal projects, in the past three decades conservative advocacy groups have rapidly grown both in number and in their vigorous use of traditional legal strategies to promote their causes.221 This growth in conservative ad-vocacy is particularly salient in juxtaposition to the decline of traditional progressive advocacy. Most recently, some thinkers have even suggested that there may be “something inherent in the left’s conception of social change — focused as it is on participation and empowerment — that produces a unique distrust of legal expertise.”222 Once again, this conclusion reveals flaws parallel to the original disenchantment with legal reform. Although the new extralegal frames present themselves as apt alternatives to legal reform models and as capable of producing significant changes to the social map, in practice they generate very limited improvement in existing social arrangements. Most strikingly, the cooptation effect here can be explained in terms of the most profound risk of the typology — that of legitimation. The common pattern of extralegal scholarship is to describe an inherent instability in dominant structures by pointing , for example, to grassroots strategies,223 and then to assume that specific instances of counterhegemonic activities translate into a more complete transformation. This celebration of multiple microresistances seems to rely on an aggregate approach — an idea that the multiplication of practices will evolve into something substantial. In fact , the myth of engagement obscures the actual lack of change being produced, while the broader pattern of equating extralegal activism with social reform produces a false belief in the potential of change. There are few instances of meaningful reordering of social and economic arrangements and macroredistribution . Scholars write about decoding what is really happening, as though the scholarly narrative has the power to unpack more than the actual conventional experience will admit.224 Unrelated efforts become related and part of a whole through mere reframing. At the same time, the elephant in the room — the rising level of economic inequality — is left unaddressed and comes to be understood as natural and inevitable.225 This is precisely the problematic process that critical theorists decry as losers’ self-mystification, through which marginalized groups come to see systemic losses as the product of their own actions and thereby begin to focus on minor achievements as representing the boundaries of their willed reality. The explorations of micro-instances of activism are often fundamentally performative, obscuring the distance between the descriptive and the prescriptive. The manifestations of extralegal activism — the law and organizing model; the proliferation of informal, soft norms and norm-generating actors; and the celebrated, separate nongovernmental sphere of action — all produce a fantasy that change can be brought about through small-scale, decentralized transformation. The emphasis is local, but the locality is described as a microcosm of the whole and the audience is national and global. In the context of the humanities, Professor Carol Greenhouse poses a comparable challenge to ethnographic studies from the 1990s, which utilized the genres of narrative and community studies, the latter including works on American cities and neighborhoods in trouble.226 The aspiration of these genres was that each individual story could translate into a “time of the nation” body of knowledge and motivation.227 In contemporary legal thought, a corresponding gap opens between the local scale and the larger, translocal one. In reality, although there has been a recent proliferation of associations and grassroots groups, few new local-state-national federations have emerged in the United States since the 1960s and 1970s, and many of the existing voluntary federations that flourished in the mid-twentieth century are in decline.228 There is, therefore, an absence of links between the local and the national, an absent intermediate public sphere, which has been termed “the missing middle” by Professor Theda Skocpol.229 New social movements have for the most part failed in sustaining coalitions or producing significant institutional change through grassroots activism. Professor Handler concludes that this failure is due in part to the ideas of contingency, pluralism, and localism that are so embedded in current activism.230 Is the focus on small-scale dynamics simply an evasion of the need to engage in broader substantive debate? It is important for next-generation progressive legal scholars, while maintaining a critical legal consciousness, to recognize that not all extralegal associational life is transformative. We must differentiate, for example, between inward-looking groups, which tend to be self-regarding and depoliticized, and social movements that participate in political activities, engage the public debate, and aim to challenge and reform existing realities.231 We must differentiate between professional associations and more inclusive forms of institutions that act as trustees for larger segments of the community.232 As described above, extralegal activism tends to operate on a more divided and hence a smaller scale than earlier social movements, which had national reform agendas. Consequently, within critical discourse there is a need to recognize the limited capacity of small-scale action. We should question the narrative that imagines consciousness-raising as directly translating into action and action as directly translating into change. Certainly not every cultural description is political. Indeed, it is questionable whether forms of activism that are opposed to programmatic reconstruction of a social agenda should even be understood as social movements. In fact, when groups are situated in opposition to any form of institutionalized power, they may be simply mirroring what they are fighting against and merely producing moot activism that settles for what seems possible within the narrow space that is left in a rising convergence of ideologies. The original vision is consequently coopted, and contemporary discontent is legitimated through a process of self-mystification. Aff Solvency Solvency – General Plan solves. Unegbu, Howard University JD candidate, 2013 [Cindy, 57 How. L.J. 433, “NOTE AND COMMENT: National Security Surveillance on the Basis of Race, Ethnicity, and Religion: A Constitutional Misstep” Lexis, accessed 7-6-15, TAP] The grant of surveillance power to monitor individuals without suspicion of criminal or terrorist activity and the ability to collect personal information from various sources on the basis of race or ethnicity has resulted in the discrimination of domestic individuals who belong to a particular racial or ethnic group. This discrimination is generated through a disparate impact that the new government surveillance authority has on various ethnic and religious groups, specifically those that are Arab, South Asian, or practitioners of the Islamic religion. Through a balancing test of five factors established through Supreme Court jurisprudence, it is apparent that there is sufficient indirect evidence of the government's intent to discriminate. Because there is an established intent to discriminate, the new government surveillance authority and procedures can only be constitutionally upheld if the acts are narrowly tailored to a compelling government interest. The compelling state interest is satisfied through the goal of nationally security; however, the narrowly tailored prong fails because of the monitoring system's over-inclusiveness. Therefore, the government national security surveillance authority and procedures, via the NCTC amendments and DIOG guidelines, are in violation of the Fourteenth Amendment's Equal Protection Clause. Solvency – 14th Amendment Surveillance targets religious, ethnic, and racial minorities disproportionately which violates the Equal Protection Clause of the 14th Amendment. Unegbu, Howard University JD candidate, 2013 [Cindy, 57 How. L.J. 433, “NOTE AND COMMENT: National Security Surveillance on the Basis of Race, Ethnicity, and Religion: A Constitutional Misstep” Lexis, accessed 7-6-15, TAP] Picture this: you live in a society in which the government is allowed to partake in intrusive surveillance measures without the institutionalized checks and balances upon which the government was founded. In this society, the government pursues citizens who belong to a particular race or ethnicity, practice a certain religion, or have affiliations with specific interest groups. Individuals who have these characteristics are subject to surreptitious monitoring, which includes undercover government officials disguising themselves as community members in order to attend various community events and programs. The government may also place these individuals on watch lists, even where there is no evidence of wrongdoing. These watch lists classify domestic individuals as potential or suspected terrorists and facilitate the monitoring of their personal activity through various law enforcement agencies for an extended period of time. This "hypothetical" society is not hypothetical at all; in fact, it is the current state of American surveillance. The government's domestic spying activities have progressed to intrusive levels, primarily due to an increased fear of terrorism. 1Link to the text of the note This fear has resulted in governmental intelligence efforts that are focused on political activists, racial and religious minorities, and immigrants. 2Link to the text of the note [435] The government's domestic surveillance efforts are not only geared toward suspected terrorists and those partaking in criminal activity, but reach any innocent, non-criminal, non-terrorist national, all in the name of national security. The government's power to engage in suspicionless surveillance and track innocent citizens' sensitive information has been granted through the creation and revision of the National Counterterrorism Center 3Link to the text of the note and the FBI's (Federal Bureau of Investigation) Domestic Investigations and Operations Guide. 4Link to the text of the note The grant of surveillance power has resulted in many opponents, including those within the current presidential administration, who challenge the order for numerous reasons. 5Link to the text of the note These reasons include the inefficiency of storing citizens' random personal information for extended periods of time, 6Link to the text of the note the broad unprecedented authority granted to this body of government without proper approval from Congress, 7Link to the text of the note and the constitutional violations due to the deprivation of citizens' rights. 8Link to the text of the note [436] This Comment argues that the wide-sweeping surveillance authority granted to the government results in a violation of the Fourteenth Amendment's Equal Protection Clause due to far-reaching domestic monitoring practices. Surveillance practices, such as posing as members of the community and placing individuals on watch lists without suspicion of terrorist activity, result in the impermissible monitoring of individuals on the basis of their race or ethnicity. These practices, although done in the name of national security, an established compelling government interest, violate the Equal Protection Clause of the Fourteenth Amendment because they are not narrowly tailored to the stated interest. The procedures are not narrowly tailored to the interest of national security because of the over-inclusiveness of the measures. K Advs – Solvency K Adv – Public Key As we continue to accept government surveillance, they are able to continue <Zach Beauchamp writer for Thinkprogress.org, contributed at Newsweek and the daily beast. He has also written for other foreign policy magazines. Has BAs in philosophy and political science from Brown University and a M.Sc in international relations form the London School of economics June 7th 2013 http://thinkprogress.org/justice/2013/06/07/2120141/why-the-nsas-secret-online-surveillance-should-scare-you/ “Why the NSA’s secret online surveillance should scare you” Accessed 7-8-2015 PAM> That second reaction illustrates precisely why this program is so troubling. The more we accept perpetual government and corporate surveillance as the norm, the more we change our actions and behavior to fit that expectation — subtly but inexorably corrupting the liberal ideal that each person should be free to live life as they choose without fear of anyone else interfering with it. Put differently, George Orwell isn’t who you should be reading to understand the dangers inherent to the NSA’s dragnet. You’d be better off turning to famous French social theorist Michel Foucault. Currently the government is unwilling to pass any more surveillance reform, leaving it up to us <Grant Gross covers news in technology policy in the government for IDG news services June 5th 2015 http://www.fastcoexist.com/3019312/heres-an-idea/could-a-new-privacy-generation-change-our-surveillancepolitics “Could a New "Privacy Generation" Change Our Surveillance Politics?” Accessed 7-8-2015 PAM> The Senate this week passed the USA Freedom Act, which aims to end the NSA's mass collection of domestic phone records, and President Barack Obama signed the bill hours later. After that action, expect Republican leaders in both the Senate and the House of Representatives to resist further calls for surveillance reform. That resistance is at odds with many rank-and-file lawmakers, including many House Republicans, who want to further limit NSA programs brought to light by former agency contractor Edward Snowden. Civil liberties groups and privacy advocates also promise to push for more changes. It may be difficult to get "broad, sweeping reform" through Congress, but many lawmakers seem ready to push for more changes, said Adam Eisgrau, managing director of the office of government relations for the American Library Association. --- People are willing to get involved. Recent polls prove <Stan Alcorn multi-media journalist based in New York City. Frequently reports for WNYC and NPR. October 9th 2013 http://www.fastcoexist.com/3019312/heres-an-idea/could-a-new-privacy-generation-change-oursurveillance-politics “Could A New "Privacy Generation" Change Our Surveillance Politics?” Accessed 7-8-2015 PAM> In a recent poll conducted at the Center for Public Opinion at the University of MassachusettsLowell, we asked a series of questions about people’s willingness to trade privacy for security or vice versa. Across a series of questions, we find that people under 40 are extremely concerned about privacy issues and willing to sacrifice their safety to keep their lives away from the eyes and ears of government monitors, but that those over 40 are far more likely to trade their privacy for security. The fact that younger people are more apt to be anti-surveillance state may not contradict the conventional wisdom of the Internet as much as it (apparently) does that of political scientists. But whether or not its catalyst is 9/11, the generational divide does seem to suggest that the way our politicians balance privacy and security will shift as the under-40s take control. The arc of history is long, but it bends toward the youngs. --- Uniqueness – Racial Targeting Now Domestic surveillance is inherently racist. Mass surveillance will inevitably target marginalized communities of color. Khalek ‘13 Khalek, Rania Rania Khalek is an independent journalist reporting on the underclass and marginalized. In addition to her work for Truthout, she's written for Extra, The Nation, Al Jazeera America, the Electronic Intifada and more. October 30 2013.Activists of Color Lead Charge Against Surveillance, NSA http://www.truth-out.org/news/item/19695-activists-of-color-atforefront-of-anti-nsa-movement. July 8, 2015 Steven Renderos, national organizer for the Center for Media Justice, who helped put together the panel, told Truthout that examining the legacy of surveillance in communities of color could help lead to solutions. "It's critical to understand the history so we can learn how to dismantle it," Renderos said. "Those of us from marginalized communities grew up in environments very much shaped by surveillance, which has been utilized to ramp up the criminal justice system and increase deportations," Renderos said. "It's having real consequences in our communities where children are growing up without parents in the home and families are being torn apart through raids and deportations, a lot of which is facilitated through the use of surveillance. "Panelist Fahd Ahmed, legal and policy director for the South Asian-led social justice organization Desis Rising Up and Moving, argued that mass surveillance is the predictable outgrowth of programs that have targeted marginalized communities for decades. "Just by the very nature of [the United States] being a settler-colonialist and capitalist nation, race and social control are central to its project," Ahmed said. "Anytime we see any levels of policing - whether it's day-to-day policing in the streets, surveillance by the police or internet surveillance - social control, particularly of those that resist the existing system, becomes an inherent part of that system. "But, he warned, "These policies are not going to be limited to one particular community. They're going to continue to expand further and further" because "the surveillance has a purpose, which is to exert the power of the state and control the potential for dissent."Seema Sadanandan, program director for ACLU DC, acknowledged the collective resentment felt by people of color who are understandably frustrated that privacy violations are only now eliciting mass public outrage when communities of color have been under aggressive surveillance for decades. "The Snowden revelations represent a terrifying moment for white, middle-class and upper-middle-class people in this country, who on some level believe that the Bill of Rights and Constitution were protecting their everyday lives," Sadanandan said. "For people of color from communities with a history of discrimination and economic oppression that prevents one from realizing any of those rights on a day-to-day basis, it wasn't a huge surprise. "But Sadanandan argued that NSA surveillance still "has particular concerns for communities of color because of their unique relationship to the criminal justice or social control system, a billion-dollar industry with regard to, for example, border patrol or data mining as it's applied to racially profile." Sadanandan warned that NSA surveillance more than likely would strengthen that system of control. The Black community is racially targeted by domestic surveillance. Targeted surveillance is a form of anti-black violence. Cyril ’15 Cyril, Malkia A.- Malkia Amala Cyril is founder and executive director of the Center for Media Justice (CMJ) and cofounder of the Media Action Grassroots Network, a national network of 175 organizations working to ensure media access, rights, and representation for marginalized communities. April 15 2015 “Black America’s State of Surveillance” http://www.progressive.org/news/2015/03/188074/black-americas-state-surveillance. July 7, 2015 government surveillance is laser-focused on the revelations by Edward Snowden that millions of Americans were being spied on by the NSA. Yet my mother’s visit from the FBI reminds me that, from the slave pass system to laws that deputized white civilians as enforcers of Jim Crow, black people and other people of color have lived for centuries with surveillance practices aimed at maintaining a racial hierarchy. It’s time for journalists to tell a new story that does not start the clock Today, media reporting on when privileged classes learn they are targets of surveillance. We need to understand that data has historically been overused to repress dissidence, monitor perceived criminality, and perpetually maintain an impoverished underclass. In an era of big data, the Internet has increased the speed and secrecy of data collection. Thanks to new surveillance technologies, law enforcement agencies are now able to collect massive amounts of indiscriminate data. Yet legal protections and policies have not caught up to this technological advance. Concerned advocates see mass surveillance as the problem and protecting privacy as the goal. Targeted surveillance is an obvious answer—it may be discriminatory, but it helps protect the privacy perceived as an earned privilege of the inherently innocent. The trouble is, targeted surveillance frequently includes the indiscriminate collection of the private data of people targeted by race but not involved in any crime. For targeted communities, there is little to no expectation of privacy from government or corporate surveillance. Instead, we are watched, either as criminals or as consumers. We do not expect policies to protect us. Instead, we’ve birthed a complex and coded culture— from jazz to spoken dialects—in order to navigate a world in which spying, from AT&T and Walmart to public benefits programs and beat cops on the block, is as much a part of our built environment as the streets covered in our blood. The violence of anti-blackness subjugates black existence. The only way to solve is acknowledging the violence and recognizing the Black identity within civil society. R.L ‘13 R.L. R.L. is an informal theorist working on the problematic of racialised identities, gender and communisation theory. June 5, 2013. WANDERINGS OF THE SLAVE: BLACK LIFE AND SOCIAL DEATH. http://www.metamute.org/editorial/articles/wanderings-slave-black-life-and-social-death. July 8, 2015. This gratuitous violence, on the one hand, subjugates black existence to an irrational accumulation of bodies, and subsequently produces a condensed delimitation of blackness in space. Whether it was the owning and trading of slaves or the contemporary phenomena of the ghetto and mass incarceration, black existence is excluded and stockpiled as so many objects within a spatial boundary. In this condition, life is reduced to a statistical quantity, black existence is made exchangeable with any other. Therefore, on the other hand, black existence is also a fungible object, infinitely malleable in its content due to the abstraction of its quality and open for use for anyone who can claim subjecthood.11 These structural features come to their fullest expression in the contemporary scenario of police shootings. The endless stream of young black men shot by police borders on excess, demonstrating the pure interchangeability of such names as equivalents, meaning that such seemingly particular empirical cases are in actuality a general condition. Blackness is as devalued as it is susceptible to all aspects of material and social containment, control and debility. Yet, in these instances, even morally indignant liberals are complicit with anti-blackness by focusing on police shootings as a contingent rather than structural feature of black existence. Often such moral indignation emphasises the atrocious nature of such events and spectacularises the use of ‘excessive force’ so as to fundamentally produce a completely inert body. Attention is then focalised on the excess of black suffering, reducing the victim to a tabula rasa upon which all manners of empathetic projection obscures the basis of a morbid white enjoyment that garners pleasure through the depiction of excoriated black flesh.12 In short; there is no prior positive blackness that could be potentially appropriated. Black existence is , the violence of anti-blackness produces black existence simultaneously produced and negated by racial domination, both as presupposition and consequence. Affirmation of blackness proves to be impossible without simultaneously affirming the violence that structures black subjectivity itself. And these conditions that procure black existence consistently repeat the sombre refrain of anti-blackness: there is no black identity, there is no black subject, there is no black life as such. As a consequence, black existence is fundamentally marked by social death, materially living as a sentient object but without a stable or guaranteed social subjectivity. And as such, the status of blackness forms the basis upon which white life can subjectivise itself, socially and materially through the negation of the black body. White life recognises itself as a positive counterpart to the non-subjecthood of blacks. However, Afro-pessimists claim that this relation between black death and white life is not merely asymmetrical. The distinction between the two is qualitatively different, and potential for reconciliation between whites and blacks is impossible. This particular distinction instead procures an antagonism in relation to the social totality. The inordinate amount of violence perpetuated against blacks – naturalised and thus ontological – means that such a situation is untranslatable to any representable terms of ‘experience’ or ‘identity’. Such a structural feature of blackness mired in violence cannot be related to contingent ‘experiences’ of social, political or economic violence, such as the struggles of workers or immigrants. Black existence forms the bottom line, the condition of possibility, of general social and material integration. It is not necessarily one’s ‘whiteness’ that matters inasmuch as one is not black enabling entrance and participation in civil society. Barred from the immanent capacities of living, anti-blackness is the necessary ground for the definition and propagation of life in general.13 In this way, Afro-pessimism also enacts a political intervention onto the terrain of identity politics and multiracial coalitions. Perhaps more generally, Afro-pessimism can be seen as a critique of the Left and all forms of activism that participate in representational politics. In the US, the past decades have seen the proliferation of identity-based politics predicated on a politics of recognition. It is this position that was made possible by the legacies of the black struggles of the 1950s to 1970s, epitomised in black liberation and the civil rights movement. However, contemporary anti-racist formations obfuscate and implicitly disavow such a legacy, while simultaneously utilising their impact to promote reform and integration. The basis of such perspectives is a wider acceptance and visibility of marginalised identities within the stronghold of civil society. Calls for unity by multiracial coalitions mask complicity with the structures of anti-blackness. They proffer an analysis that seeks to go beyond the framework of black and white racial dynamics. Yet in this gesture to ‘go beyond black and white’, the specificity of anti-blackness is obscured. In such instances, these analyses aim to discover common ground through the particularity of non-black racial identities or other oppressed categories. But this common ground is predicated on an underlying humanness, from which black existence is fundamentally barred. Such a perspective presents an atomised individual traversed by a variety of oppressions, yet these oppressions are representable and conditional to a historic instance of violence (as opposed to the ontological unconditionality of violence perpetuated against blacks), and could potentially be recognised and addressed. For it is on the basis of (human) recognition and self-representation from which minoritarian identities can wage their struggle. Black existence is barred from such a possibility due to the fact that such recognition is based upon not being black. As long as one can distance onself enough from blackness, then one has the possibility of integrating into civil society generally: The only way to solve for anti-blackness is to destroy civil society. R.L ‘13 R.L. R.L. is an informal theorist working on the problematic of racialised identities, gender and communisation theory. June 5, 2013. WANDERINGS OF THE SLAVE: BLACK LIFE AND SOCIAL DEATH. http://www.metamute.org/editorial/articles/wanderings-slave-black-life-and-social-death. July 8, 2015 Whereas redress for grievances can be sought and gained through these minoritarian struggles, ultimately they rely upon the further subjection of blacks in order to achieve such goals. Violence deployed against non-black minoritarian positions is contingent and effectively communicable through shared experiences, and therefore could be formulated into coherent demands that might be met or not. If these demands are recognised and met, they necessitate anti-blackness as a sine qua non for further integration. It is inside this ambiguous nature of empirical demands that black existence introduces a categorical antagonism reaching far beyond any empirical enunciation for socio-political recognition. For Afro-pessimists, there is no possible empirical redress for its structural position in relation to civil society, for it is the very condition that enables civil society to cohere in the first place. And this condition is that of an inordinate suffering that is not commensurate to mere experience. For this reason, black existence figures as an antagonism that transcends any empirical injustice, an antagonism that splits the world between black or human. Consequently this antagonism entails a total disorganisation of what it would mean to exist in the world at all. Black existence is essentially a structural position that positions itself as demandless, an antagonsim which is irreconcilable, and without any possible future of organic synthesis of black existence and humanity. For the form of freedom that would enable the abolition of black existence is not empirical but ontological in nature. To overcome anti-blackness, there would have to be what Fanon had called a ‘program of complete disorder,’ an expropriation and affirmation of the very violence perpetuated against black existence and a fundamental reorientation of the social coordinates of the Human relation. It would entail a war against the concept of humanity and a war that splits civil society to its core, a civil war that would elaborate itself to the death. The alternative is to reject the affirmative and reorient ourselves towards the world through an unflinching paradigmatic analysis Wilderson 10 [Frank B. III, Ph.D., Associate Professor at UC Irvine, former ANC member, “on some guerilla shit”, Red, White & Black: Cinema and the Structure of U.S. Antagonisms, pages ix-x, OG] STRANGE AS it might seem, this book project began in South Africa. During the last years of apartheid I worked for revolutionary change in both an underground and above-ground capacity, for the Charterist Movement in general and the ANC in particular. During this period, I began to see how essential an unflinching paradigmatic analysis is to a movement dedicated to the complete overthrow of an existing order. The neoliberal compromises that the radical elements of the Chartist Movement made with the moderate elements were due, in large part, to our inability or unwillingness to hold the moderates' feet to the fire of a political agenda predicated on an unflinching paradigmatic analysis. Instead, we allowed our energies and points of attention to be displaced by and onto pragmatic considerations. Simply put, we abdicated the power to pose the question—and the power to pose the question is the greatest power of all. Elsewhere, I have written about this unfortunate turn of events (Incognegro: A Memoir of Exile and Apartheid), so I'll not rehearse the details here. Suffice it to say, this book germinated in the many political and academic discussions and debates that I was fortunate enough to be a part of at a historic moment and in a place where the word revolution was spoken in earnest, free of qualifiers and irony. For their past and ongoing ideas and interventions, I extend solidarity and appreciation to comrades Amanda Alexander, Franco Barchiesi, Teresa Barnes, Patrick Bond, Ashwin Desai, Nigel Gibson, Steven Greenberg, Allan Horowitz, Bushy Kelebonye (deceased), Tefu Kelebonye, Ulrike Kistner, Kamogelo Lekubu, Andile Mngxitama, Prishani Naidoo, John Shai, and S'bu Zulu Policing/Settler societies allow for the black body to be a magnet for gratuitous violence Wilderson, Professor UCI, 2003 (Frank B., “The Prison Slave as Hegemony’s (Silent) Scandal”, Soc Justice 30 no2 2003, Accessed 8-4-12, MR) It makes no difference that in the U.S. the "casbah" and the "European" zone are laid one on top of the other. What is being asserted here is an isomorphic schematic relation the schematic interchangeability - between Fanon' s settler society and Martinot and Sexton's policing paradigm. For Fanon, it is the policeman and soldier (not the discursive, or hegemonic, agents) of colonialism that make one town white and the other Black. For Martinot and Sexton, this Manichean delirium manifests itself by way of the U.S. paradigm of policing that (re)produces, repetitively, the inside/outside, the civil society/Black world, by virtue of the difference between those bodies that do not magnetize bullets and those that do. "Police impunity serves to distinguish between the racial itself and the elsewhere that mandates it...the distinction between those whose human being is put permanently in question and those for whom it goes without saying" (Ibid.: 8). In such a paradigm, white people are, ipso facto, deputized in the face of Black people, whether they know it (consciously) or not. Whiteness, then, and by extension civil society, cannot be solely "represented" as some monumentalized coherence of phallic signifiers, but must first be understood as a social formation of contemporaries who do not magnetize bullets. This is the essence of their construction through an asignifying absence; their signifying presence is manifested by the fact that they are, if only by default, deputized against those who do magnetize bullets. In short, white people are not simply "protected" by the police, they are - in their very corporeality - the police. This ipso facto deputization of white people in the face of Black people accounts for Fanon's materiality, and Martinot and Sexton's Manichean delirium in America. What remains to be addressed, however, is the way in which the political contestation between civil society's junior partners (i.e., workers, white women, and immigrants), on the one hand, and white supremacist institutionality, on the other hand, is produced by, and reproductive of, a supplemental antiBlackness. Put another way: How is the production and accumulation of junior partner social capital dependent upon on an anti-Black rhetorical structure and a decomposed Black body? Technological surveillance creates a new space for racially profiled stop-andfrisk. Hackman ‘15 Hackman, Rose. New York journalist. April 23 2015. Online surveillance: The new stop-and-frisk. http://www.theguardian.com/us-news/2015/apr/23/online-surveillance-black-teenagers-new-stop-and-frisk. July 8, 2015. In 2013, stop-and-frisk was found unconstitutional by a federal judge for its use of racial profiling. Since then, logged instances have dropped from an astonishing 685,000 in 2011 to just 46,000 in 2014. But celebrations may be premature, with local policing increasingly moving off the streets and migrating online. In 2012, the NYPD declared a war on gangs across the city with Operation Crew Cut. The linchpin of the operation’s activities is the sweeping online surveillance of individuals as young as 10 years old deemed to be members of crews and gangs. This move is being criticized by an increasing number of community members and legal scholars, who see it as an insidious way of justifying the monitoring of young men and boys of color in low-income communities. These days, crews are understood geographically (“turf-based”). They’re no longer “entrepreneurial” – that is, heavily within the organized crime world, like LA gangs were in the 1990s. In other words, New York City crew membership, which mostly appeals to teenagers, is simply related to the block you grew up on, your community and family ties, and perhaps even your interest in partying, dance or graffiti. Advertisement Mostly, being a member of a gang or a crew is a fleeting moment of adolescence, and something that people grow out of, explains Jeffrey Lane, a professor in communication at Rutgers University whose research has looked at the way in which adolescent street life is lived online. What is unquestionably worrying – and what the NYPD is using to justify broad monitoring of large swaths of people – is when these crews turn on each other, and rivalries between crews become violent, or even deadly. And while some of the humiliation and potential violence is avoided by diverting resources away from the physical practice of stop-and-frisk, online surveillance raises a vast series of questions tied to the civil liberties of young men of color. Counter surveillance good/Bad Counter surveillance good EPIS ’15 Empire Pacific Investigation Services. Feburary 2015. Counter Surveillance Investigation.http://www.epis.us/services/domestic-surveillance-investigations/counter-surveillance.html. July 8, 2015. Counter surveillance refers to measures undertaken to prevent surveillance, including covert surveillance. Counter surveillance may include electronic methods such as bug sweeping, the process of detecting surveillance devices, including covert listening devices and visual surveillance devices. More often than not, counter surveillance will employ a set of actions that, when followed, reduce the risk of surveillance. Counter surveillance is the art of performing surveillance on those who are performing surveillance themselves and is used to ensure that the target is not being followed or under surveillance from another source. For instance, on one of the Counter surveillance cases, our client hired one of our counter surveillance private investigators to watch see who was following him, he become aware that someone is following him around and videotaping his activities. The client then hired Counter Surveillance investigators to identify the people watching him and to determine who hired them. In another case, Counter surveillance is used in cases where someone may be stalking another person. Stalkers attempt to follow and determine the patterns and activities of their targets. Counter surveillance can be used to determine who is responsible for the stalking without alerting the stalker or causing the stalker to withdraw. If the stalker withdrew, it would make it impossible to identify and neutralize their threat. Counter surveillance is an extremely difficult surveillance operation. Not only is the investigator attempting to perform surveillance on someone that may be proficient in surveillance techniques themselves, but they must do it without being detected during times when that person is performing surveillance and is, therefore, actively monitoring their surroundings. Starting Point Good – Surveillance Key Surveillance is a key starting point. Kundani and Kumar ’15 (Spring 2015 Arun Kundnani teaches at New York University. His latest book is The Muslims Are Coming! Islamophobia, Extremism, and the Domestic War on Terror, Deepa Kumar is an associate professor of Media Studies and Middle East Studies at Rutgers University. She is the author of Islamophobia and the Politics of Empire, International Socialist Review Issue 96, “Race, surveillance, and empire” http://isreview.org/issue/96/race-surveillance-and-empire DA:7/8/15 CB) Beginning in June 2013, a series of news articles based on whistle-blower Edward Snowden’s collection of documents from the National Security Agency (NSA) took the world by storm. Over the course of a year, the Snowden material provided a detailed account of the massive extent of NSA’s warrantless data collection. What became clear was that the NSA was involved in the mass collection of online material. Less apparent was how this data was actually used by the NSA and other national security agencies. Part of the answer came in July 2014 when Glenn Greenwald and Murtaza Hussain published an article that identified specific targets of NSA surveillance and showed how individuals were being placed under surveillance despite there being no reasonable suspicion of their involvement in criminal activity.1 All of those named as targets were prominent Muslim Americans. The following month, Jeremy Scahill and Ryan Devereaux published another story for The Intercept, which revealed that under the Obama administration the number of people on the National Counterterrorism Center’s no-fly list had increased tenfold to 47,000. Leaked classified documents showed that the NCC maintains a database of terrorism suspects worldwide—the Terrorist Identities Datamart Environment—which contained a million names by 2013, double the number four years earlier, and increasingly includes biometric data. This database includes 20,800 persons within the United States who are disproportionately concentrated in Dearborn, Michigan, with its significant Arab American population.2 By any objective standard, these were major news stories that ought to have attracted as much attention as the earlier revelations. Yet the stories barely registered in the corporate media landscape. The “tech community,” which had earlier expressed outrage at the NSA’s mass digital surveillance, seemed to be indifferent when details emerged of the targeted surveillance of Muslims. The explanation for this reaction is not hard to find. While many object to the US government collecting private data on “ordinary” people, Muslims tend to be seen as reasonable targets of suspicion. A July 2014 poll for the Arab American Institute found that 42 percent of Americans think it is justifiable for law enforcement agencies to profile Arab Americans or American Muslims.3 In what follows, we argue that the debate on national security surveillance that has emerged in the United States since the summer of 2013 is woefully inadequate, due to its failure to place questions of race and empire at the center of its analysis. It is racist ideas that form the basis for the ways national security surveillance is organized and deployed, racist fears that are whipped up to legitimize this surveillance to the American public, and the disproportionately targeted racialized groups that have been most effective in making sense of it and organizing opposition. This is as true today as it has been historically: race and state surveillance are intertwined in the history of US capitalism . Likewise, we argue that the history of national security surveillance in the United States is inseparable from the history of US colonialism and empire. The argument is divided into two parts. The first identifies a number of moments in the history of national security surveillance in North America, tracing its imbrication with race, empire, and capital, from the settler-colonial period through to the neoliberal era. Our focus here is on how race as a sociopolitical category is produced and reproduced historically in the United States through systems of surveillance. We show how throughout the history of the United States the systematic collection of information has been interwoven with mechanisms of racial oppression. From Anglo settler-colonialism, the establishment of the plantation system, the post–Civil War reconstruction era, the US conquest of the Philippines, and the emergence of the national security state in the post-World War II era, to neoliberalism in the post-Civil Rights era, racialized surveillance has enabled the consolidation of capital and empire. It is, however, important to note that the production of the racial “other” at these various moments is conjunctural and heterogenous. That is, the racialization of Native Americans, for instance, during the settler-colonial period took different forms from the racialization of African Americans. Further, the dominant construction of Blackness under slavery is different from the construction of Blackness in the neoliberal era; these ideological shifts are the product of specific historic conditions. In short, empire and capital, at various moments, determine who will be targeted by state surveillance, in what ways, and for how long. In the second part, we turn our attention to the current conjuncture in which the politics of the War on Terror shape national security surveillance practices. The intensive surveillance of Muslim Americans has been carried out by a vast security apparatus that has also been used against dissident movements such as Occupy Wall Street and environmental rights activists, who represent a threat to the neoliberal order. This is not new; the process of targeting dissenters has been a constant feature of American history. For instance, the Alien and Sedition Acts of the late 1790s were passed by the Federalist government against the Jeffersonian sympathizers of the French Revolution. The British hanged Nathan Hale because he spied for Washington’s army in the American Revolution. State surveillance regimes have always sought to monitor and penalize a wide range of dissenters, radicals, and revolutionaries. Race was a factor in some but by no means all of these cases. Our focus here is on the production of racialized “others” as security threats and the ways this helps to stabilize capitalist social relations. Further, the current system of mass surveillance of Muslims is analogous to and overlaps with other systems of racialized security surveillance that feed the mass deportation of immigrants under the Obama administration and that disproportionately target African Americans, contributing to their mass incarceration and what Michelle Alexander refers to as the New Jim Crow.4 We argue that racialized groupings are produced in the very act of collecting information about certain groups deemed as “threats” by the national security state —the Brown terrorist, the Black and Brown drug dealer and user, and the immigrant who threatens to steal jobs. We conclude that “security” has become one of the primary means through which racism is ideologically reproduced in the “post-racial,” neoliberal era. Drawing on W. E. B. Dubois’s notion of the “psychological wage,” we argue that neoliberalism has been legitimized in part through racialized notions of security that offer a new “psychological wage” as compensation for the decline of the social wage and its reallocation to “homeland security.” Settler- colonialism and racial security National security surveillance is as old as the bourgeois nation state, which from its very inception sets out to define “the people” associated with a particular territory, and by extension the “non-peoples,” i.e., populations to be excluded from that territory and seen as threats to the nation. Race, in modern times, becomes the main way that such threats—both internal and external—are mediated; modern mechanisms of racial oppression and the modern state are born together. This is particularly true of settler-colonial projects, such as the United States, in which the goal was to territorially dispossess Indigenous nations and pacify the resistance that inevitably sprang up. In this section, we describe how the drive for territorial expansion and the formation of the early American state depended on an effective ideological erasure of those who peopled the land. Elaborate racial profiles, based on empirical “observation”—the precursor to more sophisticated surveillance mechanisms—were thus devised to justify the dispossession of native peoples and the obliteration of those who resisted. The idea of the American nation as the land of white Anglo-Saxon Protestants enabled and justified the colonial-settler mission.5 Thus, when the US state was formed after the Revolutionary War, white supremacy was codified in the Constitution; the logical outcome of earlier settlercolonial systems of racial discrimination against African slaves and Indigenous populations.6 But the leaders of the newly formed state were not satisfied with the thirteen original colonies and set their sights on further expansion. In 1811, John Quincy Adams gave expression to this goal in the following way: “The whole continent of North America appears to be destined by Divine Providence to be peopled by one nation, speaking one language, professing one general system of religious and political principles, and accustomed to one general tenor of social usages and customs.”7 This doctrine, which would later come to be known as “manifest destiny” animated the project of establishing the American nation across the continent. European settlers were the “chosen people” who would bring development through scientific knowledge, including state-organized ethnographic knowledge of the very people they were colonizing.8 John Comaroff’s description of this process in southern Africa serves equally to summarize the colonial states of North America: “The ‘discovery’ of dark, unknown lands, which were conceptually emptied of their peoples and cultures so that their ‘wilderness’ might be brought properly to order—i.e., fixed and named and mapped—by an officializing white gaze.”9 Through, for example, the Bureau of Indian Affairs, the United States sought to develop methods of identification, categorization, and enumeration that made the Indigenous population “visible” to the surveillance gaze as racial “others.” Surveillance that defined and demarcated according to officially constructed racial typologies enabled the colonial state to sort “tribes” according to whether they accepted the priorities of the settler-colonial mission (the “good” Indians) or resisted it (the “bad” Indians).10 In turn, an idea of the US nation itself was produced as a homeland of white, propertied men to be secured against racial others. No wonder, then, that the founding texts of the modern state invoke the Indigenous populations of America as bearers of the “state of nature,” to which the modern state is counterposed—witness Hobbes’s references to the “the Savage people of America.”11 The earliest process of gathering systematic knowledge about the “other” by colonizers often began with trade and religious missionary work. In the early seventeenth century, trade in furs with the Native population of Quebec was accompanied by the missionary project. Jesuit Paul Le Jeune worked extensively with the Montagnais-Naskapi and maintained a detailed record of the people he hoped to convert and “civilize.”12 By studying and documenting where and how the “savages” lived, the nature of their relationships, their child-rearing habits, and the like, Le Juene derived a four-point program to change the behaviors of the Naskapi in order to bring them into line with French Jesuit morality. In addition to sedentarization, the establishment of chiefly authority, and the training and punishment of children, Le Juene sought to curtail the independence of Naskapi women and to impose a European family structure based on male authority and female subservience.13 The net result of such missionary work was to pave the way for the racial projects of colonization and/or “integration” into a colonial settler nation. By the nineteenth century, such informal techniques of surveillance began to be absorbed into government bureaucracy. In 1824, Secretary of War John C. Calhoun established the Office of Indian Affairs (later “Bureau”), which had as one of its tasks the mapping and counting of Native Americans. The key security question was whether to forcibly displace Native Americans beyond the colonial territory or incorporate them as colonized subjects; the former policy was implemented in 1830 when Congress passed the Indian Removal Act and President Jackson began to drive Indians to the west of the Mississippi River. Systematic surveillance became even more important after 1848, when Indian Affairs responsibility transferred from the Department of War to the Department of the Interior, and the Bureau of Indian Affairs sought to comprehensively map the Indigenous population as part of a “civilizing” project to change “the savage into a civilized man,” as a congressional committee put it. By the 1870s, Indians were “the quantified objects of governmental intervention”; resistance was subdued as much through “rational” techniques of racialized surveillance and a professional bureaucracy as through war.14 The assimilation of Indians became a comprehensive policy through the Code of Indian Offenses, which included bans on Indigenous cultural practices that had earlier been catalogued by ethnographic surveillance. Tim Rowse writes that For the U.S. government to extinguish Indian sovereignty, it had to be confident in its own. There is no doubting the strength of the sense of “manifest destiny” in the United States during the nineteenth-century, but as the new nation conquered and purchased, and filled the new territories with colonists, it had also to develop its administrative capacity to govern the added territories and peoples. U.S. sovereign power was not just a legal doctrine and a popular conviction; it was an administrative challenge and achievement that included acquiring, by the 1870s, the ability to conceive and measure an object called “the Indian population.”15 The use of surveillance to produce a census of a colonized population was the first step to controlling it. Mahmood Mamdani refers to this as “define and rule,” a process in which, before managing a heterogeneous population, a colonial power must first set about defining it; to do so, the colonial state “wielded the census not only as a way of acknowledging difference but also as a way of shaping, sometimes even creating, difference.”16 The “ethnic mapping” and “demographics unit” programs practiced by US law enforcement agencies today in the name of counterterrorism are the inheritors of these colonial practices . Both then and now, state agencies’ use of demographic information to identify “concentrations” of ethnically defined populations in order to target surveillance resources and to identify kinship networks can be utilized for the purposes of political policing. Likewise, today’s principles of counterinsurgency warfare—winning hearts and minds by dividing the insurgent from the nonresistant—echo similar techniques applied in the nineteenth century at the settler frontier. Class, gender, and racial security While racial security was central to the settler-colonial project in North America, territorial dispossession was only one aspect of the process of capital accumulation for the new state; the other was the discipline and management of labor. As Theodore Allen shows in The Invention of the White Race, the “white race” did not exist as a category in Virginia’s colonial records until the end of the seventeenth century. Whiteness as an explicit racial identity had to be cultivated over a period of decades before it could become the basis for an organized form of oppression.17 A key moment in the production of whiteness was the response of the ruling Anglo elite to Bacon’s Rebellion of 1676. The rebellion was begun by colonial settlers who wanted a more aggressive approach to securing the territory against Indigenous peoples. But it also involved African and Anglo bond laborers joining together in a collective revolt against the system of indentured servitude. This threatened not only the profitability but also the very existence of the plantation system. Over the following three decades, the Virginia Assembly passed a series of acts that racialized workers as Black and white. Those who could now call themselves white were granted some benefits by law, whereas those designated Black were turned from bond laborers (who could therefore expect to be free after a period of time) into slaves— property with no rights whatsoever and no hope of freedom. To win them to the side of the plantation bourgeoisie, poor white men were given privileges—they had access to land and enjoyed common law protections such as trial by jury and habeas corpus that were denied to Black enslaved people.18 In practice this meant that white men, for instance, could rape Black women and not be charged with a crim e (because Blacks were property and so only “damages” were to be paid to the slave owner). Further, property rights and the legal notion of settled land not only denied Native American property claims but even erased the existence of Indigenous people on the basis that, because white settlers had transformed the pristine North American wilderness into productive land, they were the real “natives.”19 Once the legal and ideological work had been done to naturalize race as a visible marker of inherent difference and to separate “us” from “them,” it could be made use of as a stable category of surveillance; the patrols set up to capture runaway slaves—arguably the first modern police forces in the United States20—needed only to “see” race in order to identify suspects. Moreover, the plantation system was stabilized by enabling non-elite whites to see security as a racial privilege and shared responsibility. W. E. B. Du Bois argued in Black Reconstruction that, in the slave plantations of the South, poor whites were brought into an identification with the planter elite by being given positions of authority over Blacks as overseers, slave drivers, and members of slave patrols. With the associated feeling of superiority, their hatred for the wider plantation economy that impoverished them was displaced onto Black enslaved people: class antagonism was racialized and turned into a pillar of stability for the system. Meanwhile, in the North, labor leaders had little appetite for abolition, fearing competition from a newly freed Black workforce.21 After abolition, the same racial anxieties were mobilized to disenfranchise the Black laborer in the South. Du Bois used the term “psychological wage” to describe this sense of superiority granted to non-elite whites in the South: It must be remembered that the white group of laborers, while they received a low wage, were compensated by a sort of public and psychological wage. They were given public deference and titles of courtesy because they were white. They were admitted freely with all classes of white people to public functions, public parks, and the best schools. The police were drawn from their ranks, and the courts, dependent under their votes, treated them with such leniency as to encourage lawlessness.… On the other hand, in the same way, the Negro was subject to public insult; was afraid of mobs; was liable to the jibes of children and the unreasoning fears of white women; and was compelled almost continuously to submit to various badges of inferiority. The result of this was that the wages of both classes could be kept low, the whites fearing to be supplanted by Negro labor, the Negroes always being threatened by the substitution of white labor.22 We suggest below that, since the 1970s, neoliberalism has involved a similar kind of process, in which the social wage of the New Deal welfare state was progressively withdrawn and racialized notions of security offered in its place as a psychological compensation. These racialized notions of security are also inflected by gender. As Du Bois notes in the above quote, free Black men were positioned as threats to white women in the post–Civil War era. Unlike during slavery, when Black men were not indiscriminately labeled as rapists and lynching was rare, the period between 1865 and 1895 saw the lynching of over ten thousand African Americans. Fredrick Douglass argued that, when all the other methods of demonizing Black people failed, the myth of the Black rapist was developed to justify lynchings and white terror.23 Vigilante groups like the Ku Klux Klan justified their brutality by claiming to keep white women safe from the Black rapist, as visualized, for instance, in D. W. Griffith’s Birth of a Nation. Such constructions of white women in need of protection from predatory Black men were reminiscent of the “captivity scenarios” of the seventeenth century, in which Native Americans were accused of kidnapping white women, a charge that then justified genocide.24 Thus, from the early settler-colonial period onwards, “security” and “protection” were defined by elites in gendered and racial terms. In particular, the white, heterosexual family was positioned as the subject of a security narrative that cast racialized others as threats to the “homeland.” The “homeland” so defined also needed to be secured from racialized immigrant threats, but which immigrants counted as white in this “homeland” was somewhat unstable. When Irish immigrants began to arrive in the United States in large numbers from the 1850s onwards, they were considered nonwhite because they were perceived to be of Celtic rather than Anglo Saxon background. More importantly, Irish Catholics faced the same exclusionary practices that Catholics did in previous centuries. Even though by the mid-eighteenth century, the need for “English colonies to be economically sustainable and militarily secure from indigenous threat,” opened up non-English immigration to North America, Catholics (along with Indian tribes) were denied basic rights on the grounds that they were religiously and culturally different from the WASP population.25 Over time, however, Irish and Italian immigrants were made white. From the late nineteenth century, the policing of the United States’s borders was another context where racial and imperial security was intertwined with practices of surveillance. Congress first sought to police borders as part of a strategy of regulating labor in 1882, when it excluded Chinese immigrants. In 1909, US immigration officials began excluding around half of all Asian Indians from entering. Following concern from the British government that anti-colonial nationalists from India were using the United States as a base to spread radical politics, US officials began to interrogate Indian migrants at West Coast ports, and a British agent arranged for the Justice Department to monitor all mail moving between India and the Berkeley and San Francisco post offices.26 In 1917, legislation was introduced to create a “barred Asiatic zone,” stretching from Afghanistan to the Pacific, from which no one could be admitted to the United States.27 With the Johnson-Reed Immigration Act of 1924, a comprehensive system of national quotas was introduced reflecting a global racial hierarchy. Through immigration policy, an idea of the US homeland as a Western European, white ethnoracial identity was institutionalized. To implement such a vision, appropriate systems of record keeping and surveillance of immigrants were required.28 Through these various means, Mae M. Ngai argues, Asian Americans and Mexican Americans were produced as “alien citizens,” formally US citizens but legally racialized and excluded. The surveillance of these groups made possible the repatriation of 400,000 persons of Mexican descent during the Great Depression (of whom half had been thought to be US citizens) and the internment of 120,000 of Japanese ancestry during World War II (two-thirds of whom were citizens).29 In the nineteenth century, the political surveillance of labor militancy had routinely been practiced by private agencies such as Pinkerton and Burns, who were directly contracted by capitalists rather than through the state. But toward the end of the century, such practices began to be absorbed into government agencies. Following the so-called Tompkins Square Riot of 1874—actually a demonstration in New York against unemployment that was attacked by the police—the New York Police Department began to assign detectives to spy on socialist and union meetings. By the mid-1890s, the department was tapping 350 phones.30 By 1900, a number of police departments in the United States had created “red squads” specifically to deploy informants to left-wing organizations and meetings. Empire and the national security state By 1890, coast-tocoast colonization was effectively complete, with the surviving Native American population consigned to reservations. Thereafter, the priority became the projection of US power further afield, again justified through a racialized understanding of American exceptionalism. As Paul Kramer writes in the context of the US conquest of the Philippines: [T]he war’s advocates subsumed US history within longer, racial trajectories of “Anglo-Saxon” history which folded together US and British imperial histories. The Philippine-American War, then, was a natural extension of Western conquest, and both taken together were the organic expression of the desires, capacities, and destinies of “Anglo-Saxon” peoples. Americans, as Anglo-Saxons, shared Britons’ racial genius for empire-building, a genius which they must exercise for the greater glory of the “race” and to advance “civilization” in general. Unlike other races, they “liberated” the peoples they conquered; indeed, their expressions of conquest as “freedom” proliferated as the terrors they unleashed became more visible.31 The resistance that Filipinos mounted to American benevolence could then only be seen as an atavistic barbarism to be countered through modern techniques of surveillance and repression. While local police departments within the United States had begun to develop techniques of political surveillance, it was under the US colonial regime in the Philippines that systematic and widespread surveillance of political opponents and the manipulation of personal information as a form of political control was first institutionalized. A unit within the police called the Constabulary Information Section was established in Manila in 1901, founded by Henry Allen, a former military attaché to Tsarist Russia.32 The Constabulary Information Section cultivated hundreds of paid Filipino agents across the country, making it “scarcely possible for seditionary measures of importance to be hatched without our knowledge,” as Allen wrote to President Theodore Roosevelt.33 The techniques of compiling dossiers on dissidents’ private lives, spreading disinformation in the media, and planting agents provocateurs among militants were applied to combating radical nationalist groupings in Manila. Control over information proved as effective a tool of colonial power as physical force. As historian Alfred W. McCoy notes, during World War I police methods that had been tested and perfected in the colonial Philippines migrated homeward to provide both precedents and personnel for the establishment of a US internal security apparatus.… After years of pacifying an overseas empire where race was the frame for perception and action, colonial veterans came home to turn the same lens on America, seeing its ethnic communities . . . as internal colonies requiring coercive controls.34 On this basis, a domestic national security apparatus emerged, with notions of race and empire at its core. From 1917, the FBI and police department red squads in US cities increasingly busied themselves with fears of subversion from communists, pacifists, anarchists, and the ten million German Americans who were suspected of harboring disloyalties. During World War I, thirty million letters were physically examined and 350,000 badge-carrying vigilantes snooped on immigrants, unions, and socialists.35 Concerns over privacy set limits to such surveillance after the war, but with increasing left-wing and right-wing radicalization in the 1930s, President Roosevelt decided to issue a secret executive order that authorized a shift in the FBI’s role from a narrowly conceived law enforcement agency focused on gathering evidence for criminal prosecutions into an intelligence agency. Thereafter, it was dedicated to spying on “subversive” political movements (primarily communists, but also fascists) and countering their ability to influence public debate . This meant the FBI systematically identifying subversives based on “ideological and associational criteria.”36 It also opened the door to the burgeoning counter-subversion practices that the bureau would launch over the following decades. Already during World War II, the FBI was collecting detailed files on suspected communists while Black organizations such as the National Association for the Advancement of Colored People and the Nation of Islam were also surveillance targets.37 At the end of the Second World War, the United States emerged as one of two superpowers on the world stage. Pushing back against the isolationists, Cold War liberals made the case for the establishment of a permanent national security state. According to historian Paul Hogan, the national security mindset that emerged involved a conviction that a new era of total war had dawned on the United States. In total war, the battle was not confined to the front lines but extended to the home front as well, as did the awesome destruction that modern weapons could inflict not only on military combatants but also on industry, urban centers, and civilian populations. Modern war was total war in this sense that modern armies depended on the output of citizen soldiers in farms and factories behind the battle line. In total war all of the nation’s resources and all of its energy and talent had to be mobilized on behalf of the war effort, thereby obliterating the old distinction between civilian and military, between citizen and soldier, between home front and the front line. When American leaders talked about total war they did so in these terms and also in terms that recognized that modern weapons could bring massive destruction from great distances with barely a moment’s notice. In the new age, American leaders would no longer have the time to debate the issue of war or peace or to prepare at a slow pace.38 This was an updating and reworking of the settler-colonial mentality, with the notion of Manifest Destiny being explicitly drawn on in making the case for an exceptional American empire. The notion of the “citizen-soldier” was built upon earlier settler-colonial racialized security narratives. However, American exceptionalism, as it emerged in this period, was based on the premise that the United States was not only unique among other nations and therefore destined to play a leading global role, but also a nation built upon liberal principles. This meant that the centrality of whiteness to the security narrative was muted and less prominent. Even though the white middle-class home was cast as the locus of a privatized notion of self-defense and military preparedness through government civil defense policies and programs,39 the image of the US empire was one of liberalism, inclusivity, and the “melting pot.” The United States sought quite consciously to differentiate itself from past empires as it positioned itself to be one of two hegemons on the global stage. In this context, the existence of Jim Crow segregation was an embarrassment for the ruling class. In 1947, the National Security Act was passed which entrenched “security” as a key element of the postwar order. Every aspect of life—the social, political, intellectual, and economic— was conceived as playing a role in national defense, and a massive security establishment was built up. The 1947 act created the Office of the Secretary of Defense, the Joint Chiefs of Staff, the National Security Council (NSC), and the Central Intelligence Agency (CIA). The National Security Agency (NSA) was formed in 1952, conceived as an organization to carry out the gathering of “signals intelligence.” During this period, there was also the integration of corporate America, of universities, of research institutions, and of the media into the machinery of the national security state. The earlier distinctions between the citizen and soldier and between the home front and the battle front were blurred to shore up an imperial system at home and abroad. Surveillance was central to sustaining and reproducing this system. From the 1940s to the early 1970s, FBI wiretapping and bugging operations focused on a wide range of movements, activists, and public figures. The following list of targets compiled by historian Athan Theoharis gives a flavor of the surveillance and is worth quoting in full: Radical activists (David Dallin, Charles Malamuth, C. B. Baldwin, Frank Oppenheimer, Bertolt Brecht, Thomas Mann, Heinrich Mann, Helene Weigel, Berthold Viertel, Anna Seghers, Bodo Uhse, Richard Criley, Frank Wilkinson), prominent liberal and radical attorneys (Bartley Crum, Martin Popper, Thomas Corcoran, David Wahl, Benjamin Margolis, Carol King, Robert Silberstein, National Lawyers Guild, Fred Black), Radical labor leaders and unions (Harry Bridges; United Auto Workers; National Maritime Union; National Union of Marine Cooks and Stewards; United Public Workers; United Electrical Radio and Machine Workers; Food, Tobacco, Agricultural and Allied Workers; International Longshoremen’s and Warehousemen’s Union; CIO Maritime Committee; Congress of Industrial Organizations Council), Journalists (I. F. Stone, Philip Jaffe, Kate Mitchell, Mark Gayn, Leonard Lyons, William Beecher, Marvin Kalb, Henry Brandon, Hedrick Smith, Lloyd Norman, Hanson Baldwin, Inga Arvad), Civil-rights activists and organizations (Martin Luther King, Jr.; Malcolm X; Southern Christian Leadership Conference; National Association for the Advancement of Colored People; March on Washington Movement; Gandhi Society for Human Rights; Elijah Muhammad; Nation of Islam; Stokely Carmichael; H. Rap Brown; Student Non-Violent Coordinating Committee; Alabama Peoples Education Association; Committee to Aid the Monroe Defendants; Southern Conference for Human Welfare; Black Panther Party; Universal Negro Improvement Association; African Liberation Day Committee), The Students for a Democratic Society, Ku Klux Klan, National Committee to Abolish HUAC, Socialist Workers Party, Washington Bookstore Association, Northern California Association of Scientists, Federation of American Scientists, American Association of Scientific Workers, pre–World War II isolationists (Henry Grunewald, Ethel Brigham, John O’Brien, Lillian Moorehead, Laura Ingalls, America First, Jehovah’s Witnesses, Los Angeles Chamber of Commerce), and even prominent personalities (Joe Namath, Harlow Shapley, Edward Condon, Edward Prichard, Muhammad Ali, Benjamin Spock).40 In a bid to shape public opinion, the FBI also launched a mass media campaign in 1946 that released “educational materials” to cooperative journalists and legislators. In the late 1950s, the FBI launched its secret counterintelligence program (COINTELPRO), which used provocateurs and informants to infiltrate communist groups initially, but later widened to include Puerto Rican nationalists, the student movement, the civil rights movement, and Black liberation movements. About 1,500 of the 8,500 American Communist Party members were likely FBI informants in the early 1960s. By the end of the decade, agents who had previously worked in US foreign intelligence were transferring to the burgeoning field of domestic intelligence to spy on radical movements, whether employed by the bureau, military intelligence, or the expanding red squads in local police departments.41 A key part of the FBI’s countersubversion strategy was the manipulation of political activists into committing criminal acts so that they could be arrested and prosecuted. Agents provocateurs working for the FBI initiated disruptions of meetings and demonstrations, fights between rival groups, attacks on police, and bombings. FBI agents also secretly distributed derogatory and scurrilous material to police, Congress, elected officials, other federal agencies, and the mass media.42 In an attempt to “neutralize” Martin Luther King, Jr., who, the FBI worried, might abandon his “obedience to white liberal doctrines” (as indeed he did), he was placed under intense surveillance, and attempts were made to destroy his marriage and induce his suicide. In various cities, the FBI and local police used fake letters and informants to stir up violence between rival factions and gangs to disrupt the Black Panther Party.43 In a number of cases, police departments or federal agents carried out the direct assassination of Black Panthers.44 Since 1945, the government had been running a mass spying program known as Project Shamrock, which the NSA took over in 1952. The telecommunications companies at the time handed over to the NSA all telegrams sent out of and into the United States. By the early 1970s, NSA analysts were collecting and analyzing approximately 150,000 telegrams a month. In 1967, the FBI and CIA submitted lists of names to the National Security Agency of key activists in the civil rights and anti-Vietnam War movements, hoping that the NSA would be able to find evidence of the communist conspiracy that President Lyndon Johnson thought must be causing the new militancy of the 1960s. The list included politically active public figures such as actress Jane Fonda and singer Joan Baez, as well as Martin Luther King, Jr., Eldridge Cleaver, and Abbie Hoffman. NSA officers began surveillance of these activists’ communications, using special records procedures to prevent discovery of what they knew to be an illegal program. This “watch list” program was expanded under President Nixon and named Operation Minaret; in all, the international communications of more than a thousand US citizens and organizations and more than two thousand foreign citizens were intercepted.45 Such was the proliferation of government spying in the 1960s that even such a minor law enforcement agency as the Ohio Highway Patrol ran an intelligence unit claiming to have student informers on every campus in the state.46 The vast expansion of state surveillance in the 1960s was a response to the new militancy of the movements against the imperialist war in Vietnam and for civil rights and Black liberation. Initially, security officials assumed the Civil Rights movement in the South, the campus protests, and the Black insurrections in northern cities were the result of a communist conspiracy; informants and electronic monitoring were deployed to try to identify the hidden agitators thought to be manipulating events behind the scenes. But it soon became apparent that these movements were manifestations of a new kind of politics that could not be understood according to the conspiratorial calculus of “front groups” and “fellow travelers”; surveillance therefore had to be widened to monitor ordinary participants, particularly in Black communities, in what was increasingly seen as a popular insurgency. Even then, the hope was that new electronic technologies would be the answer. National security advisor Zbigniew Brzezinski commented in 1970 that technology would make it “possible to assert almost continuous surveillance over every citizen and maintain up-to-date files, containing even personal information about the . . . behavior of the citizen, in addition to the more customary data.”47 Neoliberalism and racial security The expansion of the surveillance state in the twentieth century was one aspect of a wider penetration of the state into the lives of Americans. Working class struggle had somewhat unexpectedly driven this expansion: the state responded by taking on a mediating role between labor and capital, offering a measure of protection from the ravages of a market economy through Keynesian economics and the creation of a welfare state after the New Deal—albeit one that was underdeveloped compared to Western Europe. State managers sought to stabilize capitalism by imposing a degree of “rationality” on the system through regulating the economy and providing social services, all of which required a greater penetration of the state into civil society.48 In the new era of neoliberal capitalism that began in the 1970s, ruling elites sought to break this social contract, which rested on the premise that, if the working class “played by the rules,” it could see increases in wages and living conditions. From the 1970s onwards, this arrangement was undone. Alongside, there were also the beginnings of a contraction of the social wage of welfare provisions, public housing, education, and healthcare. The end result was growing inequality and a new regime of the one percent. The state responded to the permanent joblessness, ghettoization, and stigmatization that neoliberalism produced among the poor by turning to policies of mass criminalization and incarceration. Thus, the neoliberal onslaught went hand in hand with securitization. As Loïc Wacquant writes, since the civil rights era America has launched into a social and political experiment without precedent or equivalent in the societies of the postwar West: the gradual replacement of a (semi-) welfare state by a police and penal state for which the criminalization of marginality and the punitive containment of dispossessed categories serve as social policy at the lower end of the class and ethnic order.49 The law and order rhetoric that was used to mobilize support for this project of securitization was racially coded, associating Black protest and rebellion with fears of street crime. The possibilities of such an approach had been demonstrated in the 1968 election, when both the Republican candidate Richard Nixon and the independent segregationist George Wallace had made law and order a central theme of their campaigns. It became apparent that Republicans could cleave Southern whites away from the Democratic Party through tough-on-crime rhetoric that played on racial fears. The Southern Strategy, as it would be called, tapped into anxieties among working-class whites that the civil rights reforms of the 1960s would lead to them competing with Blacks for jobs, housing, and schools. With the transformation of the welfare state into a security state, its embedding in everyday life was not undone but diverted to different purposes. Social services were reorganized into instruments of surveillance. Public aid became increasingly conditional on upholding certain behavioral norms that were to be measured and supervised by the state, implying its increasing intrusion into the lives of the poor—culminating in the “workfare” regimes of the Clinton administration.50 In this context, a new model of crime control came into being. In earlier decades, criminologists had focused on the process of rehabilitation; those who committed crimes were to be helped to return to society. While the actual implementation of this policy was uneven, by the 1970s, this model went out of fashion. In its place, a new “preventive” model of crime control became the norm, which was based on gathering information about groups to assess the “risk” they posed. Rather than wait for the perpetrator to commit a crime, risk assessment methods called for new forms of “preventive surveillance,” in which whole groups of people seen as dangerous were subject to observation, identification, and classification.51 The War on Drugs—launched by President Reagan in 1982—dramatically accelerated the process of racial securitization. Michelle Alexander notes that At the time he declared this new war, less than 2 percent of the American public viewed drugs as the most important issue facing the nation. This fact was no deterrent to Reagan, for the drug war from the outset had little to do with public concern about drugs and much to do with public concern about race. By waging a war on drug users and dealers, Reagan made good on his promise to crack down on the racially defined “others”—the undeserving.52 Operation Hammer, carried out by the Los Angeles Police Department in 1988, illustrates how racialized surveillance was central to the War on Drugs. It involved hundreds of officers in combat gear sweeping through the South Central area of the city over a period of several weeks, making 1,453 arrests, mostly for teenage curfew violations, disorderly conduct, and minor traffic offenses. Ninety percent were released without charge but the thousands of young Black people who were stopped and processed in mobile booking centers had their names entered onto the “gang register” database, which soon contained the details of half of the Black youths of Los Angeles. Entry to the database rested on such supposed indicators of gang membership as high-five handshakes and wearing red shoelaces. Officials compared the Black gangs they were supposedly targeting to the National Liberation Front in Vietnam and the “murderous militias of Beirut,” signaling the blurring of boundaries between civilian policing and military force, and between domestic racism and overseas imperialism.53 In the twelve years leading up to 1993, the rate of incarceration of Black Americans tripled,54 establishing the system of mass incarceration that Michelle Alexander refers to as the new Jim Crow.55 And yet those in prison were only a quarter of those subject to supervision by the criminal justice system, with its attendant mechanisms of routine surveillance and “intermediate sanctions,” such as house arrests, boot camps, intensive supervision, day reporting, community service, and electronic tagging. Criminal records databases, which are easily accessible to potential employers, now hold files on around one-third of the adult male population.56 Alice Goffman has written of the ways that mass incarceration is not just a matter of imprisonment itself but also the systems of policing and surveillance that track young Black men and label them as would-be criminals before and after their time in prison. From stops on the street to probation meetings, these systems, she says, have transformed poor Black neighborhoods into communities of suspects and fugitives. A climate of fear and suspicion pervades everyday life, and many residents live with the daily concern that the authorities will seize them and take them away.57 A predictable outcome of such systems of classification and criminalization is the routine racist violence carried out by police forces and the regular occurrences of police killings of Black people, such as Michael Brown in Ferguson, Missouri, on August 9, 2014. The mass surveillance of Muslim Americans Discussions of the surveillance of Muslim Americans usually begin with 9/11 and make little attempt to locate them in the longer history of racial surveillance in the United States. Yet the continuities are striking, particularly for Black Muslims, who have been seen as extremists and subject to national security monitoring since the 1940s. Already in the late 1960s, Arab American student groups involved in supporting the Palestinian national movement had come under surveillance and, in 1972, the Nixon administration issued a set of directives known as Operation Boulder that enabled the CIA and FBI to coordinate with the pro-Israel lobby in monitoring Arab activists. By the 1980s, but especially after 9/11, a process was under way in which “Muslimness” was racialized through surveillance—another scene of the state’s production of racial subjects. Since all racisms are socially and politically constructed rather than resting on the reality of any biological “race,” it is perfectly possible for cultural markers associated with Muslimness (forms of dress, rituals, languages, etc.) to be turned into racial signifiers.58 This signification then serves to indicate a people supposedly prone to violence and terrorism, which, under the War on Terror, justifies a whole panoply of surveillance and criminalization, from arbitrary arrests, to indefinite detention, deportation, torture, solitary confinement, the use of secret evidence, and sentencing for crimes that “we” would not be jailed for, such as speech, donations to charitable organizations, and other such acts considered material support for terrorism. Significantly, the racial underpinnings of the War on Terror sustain not just domestic repression but foreign abuses—the war’s vast death toll in Afghanistan, Iraq, Pakistan, Somalia, Yemen, and elsewhere could not be sustained without the dehumanization of its Muslim victims. As before, racism at home goes hand in hand with empire abroad. Counterinsurgency thinking that informed the strategies used in Iraq and Afghanistan in the face of popular insurrection are also brought home to be deployed in relation to Muslim American populations. Winning “hearts and minds,” the counterinsurgency slogan first introduced by British colonialists in Malaya, and then adopted by the US military in Vietnam, reappears as the phrase that state planners invoke to prevent “extremism” among young Muslims in the United States. Counterinsurgency in this context means total surveillance of Muslim populations, and building law enforcement agency partnerships with “good Muslims,” those who are willing to praise US policy and become sources of information on dissenters, making life very difficult for “bad Muslims” or those who refuse (in ways reminiscent of the “good” and “bad” Indians). It is a way of ensuring that the knowledge Muslims tend to have of how US foreign policy harms the Middle East, Africa, and Asia is not shared with others. The real fear of the national security state is not the stereotypical Muslim fanatic but the possibility that other groups within US society might build alliances with Muslims in opposition to empire. The various measures that the US national security system has adopted in recent years flow from an analysis of Muslim “radicalization,” which assumes that certain law-abiding activities associated with religious ideology are indicators of extremism and potential violence. Following the preventive logic discussed above, the radicalization model claims to be able to predict which individuals are not terrorists now but might be at some later date. Behavioral, cultural, and ideological signals are assumed to reveal who is at risk of turning into a terrorist at some point in the future.59 For example, in the FBI’s radicalization model, such things as growing a beard, starting to wear traditional Islamic clothing, and becoming alienated from one’s former life are listed as indicators, as is “increased activity in a pro-Muslim social group or political cause.”60 Thus, signifiers of Muslimness such as facial hair, dress, and so on are turned into markers of suspicion for a surveillance gaze that is also a racial (and gendered) gaze; it is through such routine bureaucratic mechanisms that counterterrorism practices involve the social construction of racial others. Official acceptance of the model of radicalization implies a need for mass surveillance of Muslim populations and collection of as much data as possible on every aspect of their lives in order to try to spot the supposed warning signs that the models list. And this is exactly the approach that law enforcement agencies introduced. At the New York Police Department, for instance, the instrumentalizing of radicalization models led to the mass, warrantless surveillance of every aspect of Muslim life. Dozens of mosques in New York and New Jersey and hundreds more “hot spots,” such as restaurants, cafés, bookshops, community organizations, and student associations were listed as potential security risks. Undercover officers and informants eavesdropped at these “locations of interest” to listen for radical political and religious opinions. A NYPD “Moroccan Initiative” compiled a list of every known Moroccan taxi driver. Muslims who changed their names to sound more traditionally American or who adopted Arabic names were investigated and catalogued in secret NYPD intelligence files. It is clear that none of this activity was based on investigating reasonable suspicions of criminal activity. This surveillance produced no criminal leads between 2006 and 2012, and probably did not before or after.61 As of 2008, the FBI had a roster of 15,000 paid informants62 and, according to Senator Dianne Feinstein of the Senate Intelligence Committee, the bureau had 10,000 counterterrorism intelligence analysts in 2013.63 The proportion of these informants and analysts who are assigned to Muslim populations in the United States is unknown but is likely to be substantial. The kinds of infiltration and provocation tactics that had been practiced against Black radicals in the 1960s are being repeated today. What has changed are the rationales used to justify them: it is no longer the threat of Black nationalist subversion, but the threat of Muslim radicalization that is invoked. With new provisions in the Clinton administration’s 1996 Antiterrorism and Effective Death Penalty Act, the FBI can launch investigations of a suspected individual or organization simply for providing “material support” to terrorism—a vague term that could include ideological activity unrelated to any actual plot to carry out violence. While COINTELPRO violated federal laws, today similar kinds of investigation and criminalization of political dissent can be carried out legitimately in the name of countering terrorism. For Muslim populations on the receiving end of state surveillance programs designed to prevent “radicalization,” everyday life increasingly resembles the patterns described in classic accounts of authoritarianism. There is the same sense of not knowing whom to trust and choosing one’s words with special care when discussing politics, and of the arbitrariness and unpredictability of state power.64 With the 2011 leaking of some NYPD intelligence files, individual Muslims have had the disturbing experience of seeing their names mentioned in government files, along with details of their private lives. Numerous businesses, cafés, restaurants, and mosques in New York are aware that the NYPD considers them hotspots and deploys informants to monitor them. And the recent outing of a small number of NYPD informants has meant some Muslims in New York have found that relationships they thought of as genuine friendships were actually covert attempts to gather intelligence.65 Racial security in the “post-racial” era The election of Barack Obama as president in 2008 was said to have ushered in a new “post-racial” era, in which racial inequalities were meant to be a thing of the past. African Americans and Muslim Americans placed their hopes in Obama, voting for him in large numbers. But in the so-called post-racial era, the security narrative of hardworking families (coded white) under threat from dangerous racial others has been as powerful as ever. The unprecedented mass deportation of more than two million people during the Obama presidency is one form taken by this post-racial racialized securitization. Over the last two decades, the progressive criminalization of undocumented immigrants has been achieved through the building of a militarized wall between Mexico and the United States, hugely expanding the US border patrol, and programs such as Secure Communities, which enables local police departments to access immigration databases. Secure Communities was introduced in 2008 and stepped up under Obama. It has resulted in migrants being increasingly likely to be profiled, arrested, and imprisoned by local police officers, before being passed to the federal authorities for deportation. Undocumented migrants can no longer have any contact with police officers without risking such outcomes. There is an irony in the way that fears of “illegal immigration” threatening jobs and the public purse have become stand-ins for real anxieties about the neoliberal collapse of the old social contract: the measures that such fears lead to—racialization and criminalization of migrants—themselves serve to strengthen the neoliberal status quo by encouraging a precarious labor market. Capital, after all, does not want to end immigration but to profit from “a vast exploitable labor pool that exists under precarious conditions, that does not enjoy the civil, political and labor rights of citizens and that is disposable through deportation.”66 What brings together these different systems of racial oppression—mass incarceration, mass surveillance, and mass deportation—is a security logic that holds the imperial state as necessary to keeping “American families” (coded white) safe from threats abroad and at home. The ideological work of the last few decades has cultivated not only racial security fears but also an assumption that the security state is necessary to keep “us” safe. In this sense, security has become the new psychological wage to aid the reallocation of the welfare state’s social wage toward homeland security and to win support for empire in the age of neoliberalism. Through the notion of security, social and economic anxieties generated by the unraveling of the Keynesian social compact have been channeled toward the Black or Brown street criminal, welfare recipient, or terrorist. In addition, as Susan Faludi has argued, since 9/11, this homeland in need of security has been symbolized, above all, by the white domestic hearth of the prefeminist fifties, once again threatened by mythical frontier enemies, hidden subversives, and racial aggressors. That this idea of the homeland coincides culturally with “the denigration of capable women, the magnification of manly men, the heightened call for domesticity, the search for and sanctification of helpless girls” points to the ways it is gendered as well as racialized.67 The post-Snowden debate The mechanisms of surveillance outlined in this essay were responses to political struggles of various kinds—from anticolonial insurgencies to slave rebellions, labor militancy to anti-imperialist agitation. Surveillance practices themselves have also often been the target of organized opposition. In the 1920s and 1970s, the surveillance state was pressured to contract in the face of public disapproval. The antiwar activists who broke into an FBI field office in Media, Pennsylvania, in 1971 and stole classified documents managed to expose COINTELPRO, for instance, leading to its shut down. (But those responsible for this FBI program were never brought to justice for their activities and similar techniques continued to be used later against, for example in the 1980s, the American Indian Movement, and the Committee in Solidarity with the People of El Salvador.68) Public concern about state surveillance in the 1970s led to the Church committee report on government spying and the Handschu guidelines that regulated the New York Police Department’s spying on political activities. Those concerns began to be swept aside in the 1980s with the War on Drugs and, especially, later with the War on Terror. While significant sections of the public may have consented to the security state, those who have been among its greatest victims—the radical Left, antiwar activists, racial justice and Black liberation campaigners, and opponents of US foreign policy in Latin America and the Middle East— understand its workings. Today, we are once again in a period of revelation, concern, and debate on national security surveillance. Yet if real change is to be brought about, the racial history of surveillance will need to be fully confronted—or opposition to surveillance will once again be easily defeated by racial security narratives. The significance of the Snowden leaks is that they have laid out the depth of the NSA’s mass surveillance with the kind of proof that only an insider can have. The result has been a generalized level of alarm as people have become aware of how intrusive surveillance is in our society, but that alarm remains constrained within a public debate that is highly abstract, legalistic, and centered on the privacy rights of the white middle class. On the one hand, most civil liberties advocates are focused on the technical details of potential legal reforms and new oversight mechanisms to safeguard privacy. Such initiatives are likely to bring little change because they fail to confront the racist and imperialist core of the surveillance system. On the other hand, most technologists believe the problem of government surveillance can be fixed simply by using better encryption tools. While encryption tools are useful in increasing the resources that a government agency would need to monitor an individual, they do nothing to unravel the larger surveillance apparatus. Meanwhile, executives of US tech corporations express concerns about loss of sales to foreign customers concerned about the privacy of data. In Washington and Silicon Valley, what should be a debate about basic political freedoms is simply a question of corporate profits.69 Another and perhaps deeper problem is the use of images of state surveillance that do not adequately fit the current situation—such as George Orwell’s discussion of totalitarian surveillance. Edward Snowden himself remarked that Orwell warned us of the dangers of the type of government surveillance we face today.70 Reference to Orwell’s 1984 has been widespread in the current debate; indeed, sales of the book were said to have soared following Snowden’s revelations.71 The argument that digital surveillance is a new form of Big Brother is, on one level, supported by the evidence. For those in certain targeted groups—Muslims, left-wing campaigners, radical journalists—state surveillance certainly looks Orwellian. But this level of scrutiny is not faced by the general public. The picture of surveillance today is therefore quite different from the classic images of surveillance that we find in Orwell’s 1984, which assumes an undifferentiated mass population subject to government control. What we have instead today in the United States is total surveillance, not on everyone, but on very specific groups of people, defined by their race, religion, or political ideology: people that NSA officials refer to as the “bad guys.” In March 2014, Rick Ledgett, deputy director of the NSA, told an audience: “Contrary to some of the stuff that’s been printed, we don’t sit there and grind out metadata profiles of average people. If you’re not connected to one of those valid intelligence targets, you are not of interest to us.”72 In the national security world, “connected to” can be the basis for targeting a whole racial or political community so, even assuming the accuracy of this comment, it points to the ways that national security surveillance can draw entire communities into its web, while reassuring “average people” (code for the normative white middle class) that they are not to be troubled. In the eyes of the national security state, this average person must also express no political views critical of the status quo. Better oversight of the sprawling national security apparatus and greater use of encryption in digital communication should be welcomed. But by themselves these are likely to do little more than reassure technologists, while racialized populations and political dissenters continue to experience massive surveillance. This is why the most effective challenges to the national security state have come not from legal reformers or technologists but from grassroots campaigning by the racialized groups most affected. In New York, the campaign against the NYPD’s surveillance of Muslims has drawn its strength from building alliances with other groups affected by racial profiling: Latinos and Blacks who suffer from hugely disproportionate rates of stop and frisk. In California’s Bay Area, a campaign against a Department of Homeland Security-funded Domain Awareness Center was successful because various constituencies were able to unite on the issue, including homeless people, the poor, Muslims, and Blacks. Similarly, a demographics unit planned by the Los Angeles Police Department, which would have profiled communities on the basis of race and religion, was shut down after a campaign that united various groups defined by race and class. The lesson here is that, while the national security state aims to create fear and to divide people, activists can organize and build alliances across race lines to overcome that fear. To the extent that the national security state has targeted Occupy, the antiwar movement, environmental rights activists, radical journalists and campaigners, and whistleblowers, these groups have gravitated towards opposition to the national security state. But understanding the centrality of race and empire to national security surveillance means finding a basis for unity across different groups who experience similar kinds of policing: Muslim, Latino/a, Asian, Black, and white dissidents and radicals. It is on such a basis that we can see the beginnings of an effective multiracial opposition to the surveillance state and empire. Surveillance Good – Starting Point Surveillance Good – Comes First Surveillance Good – Starting Point Domestic surveillance is a necessary starting point – surveillance is a critical facet in the historically contingent construction of race under the neoliberal order of Empire. Kundnani, New York University media culture and communication professor, and Kumar, Rutgers University media studies and Middle East studies professor, 2015 [Arun and Deepa, “Race, surveillance, and empire” http://isreview.org/issue/96/racesurveillance-and-empire, accessed 7-11-15, TAP] In what follows, we argue that the debate on national security surveillance that has emerged in the United States since the summer of 2013 is woefully inadequate, due to its failure to place questions of race and empire at the center of its analysis. It is racist ideas that form the basis for the ways national security surveillance is organized and deployed, racist fears that are whipped up to legitimize this surveillance to the American public, and the disproportionately targeted racialized groups that have been most effective in making sense of it and organizing opposition. This is as true today as it has been historically: race and state surveillance are intertwined in the history of US capitalism. Likewise, we argue that the history of national security surveillance in the United States is inseparable from the history of US colonialism and empire. The argument is divided into two parts. The first identifies a number of moments in the history of national security surveillance in North America, tracing its imbrication with race, empire, and capital, from the settler-colonial period through to the neoliberal era. Our focus here is on how race as a sociopolitical category is produced and reproduced historically in the United States through systems of surveillance. We show how throughout the history of the United States the systematic collection of information has been interwoven with mechanisms of racial oppression. From Anglo settler-colonialism, the establishment of the plantation system, the post–Civil War reconstruction era, the US conquest of the Philippines, and the emergence of the national security state in the postWorld War II era, to neoliberalism in the post-Civil Rights era, racialized surveillance has enabled the consolidation of capital and empire. It is, however, important to note that the production of the racial “other” at these various moments is conjunctural and heterogenous. That is, the racialization of Native Americans, for instance, during the settler-colonial period took different forms from the racialization of African Americans. Further, the dominant construction of Blackness under slavery is different from the construction of Blackness in the neoliberal era; these ideological shifts are the product of specific historic conditions. In short, empire and capital, at various moments, determine who will be targeted by state surveillance, in what ways, and for how long. In the second part, we turn our attention to the current conjuncture in which the politics of the War on Terror shape national security surveillance practices. The intensive surveillance of Muslim Americans has been carried out by a vast security apparatus that has also been used against dissident movements such as Occupy Wall Street and environmental rights activists, who represent a threat to the neoliberal order. This is not new; the process of targeting dissenters has been a constant feature of American history. For instance, the Alien and Sedition Acts of the late 1790s were passed by the Federalist government against the Jeffersonian sympathizers of the French Revolution. The British hanged Nathan Hale because he spied for Washington’s army in the American Revolution. State surveillance regimes have always sought to monitor and penalize a wide range of dissenters, radicals, and revolutionaries. Race was a factor in some but by no means all of these cases. Our focus here is on the production of racialized “others” as security threats and the ways this helps to stabilize capitalist social relations. Further, the current system of mass surveillance of Muslims is analogous to and overlaps with other systems of racialized security surveillance that feed the mass deportation of immigrants under the Obama administration and that disproportionately target African Americans, contributing to their mass incarceration and what Michelle Alexander refers to as the New Jim Crow.4 We argue that racialized groupings are produced in the very act of collecting information about certain groups deemed as “threats” by the national security state—the Brown terrorist, the Black and Brown drug dealer and user, and the immigrant who threatens to steal jobs. We conclude that “security” has become one of the primary means through which racism is ideologically reproduced in the “post-racial,” neoliberal era. Drawing on W. E. B. Dubois’s notion of the “psychological wage,” we argue that neoliberalism has been legitimized in part through racialized notions of security that offer a new “psychological wage” as compensation for the decline of the social wage and its reallocation to “homeland security.” Anti-Blackness Adv Uniqueness – Racial Targeting Now Black peace movements are being labeled as terrorists in the SQ PARTON ’15 (HEATHER DIGBY PARTON, a political writer for Salon.com, “A racial “Big Brother” debacle: Why is the government spying on Black Lives Matter protests?”, Salon.com, THURSDAY, MAR 19, 2015 02:22 PM EDT, http://www.salon.com/2015/03/19/a_racial_big_brother_debacle_why_is_the_g overnment_spying_on_black_lives_matter_protests/, Accessed July 2015, CMT) After all, in these days of hyper awareness over the terrorist threat, it doesn’t take much imagination to see how that sort of thing could get out of hand, so it’s important that they follow the rules. Now there was a time when the cause of anti-communism required that we be extra-vigilant because the Russians were coming and dissent was closely monitored by police and the FBI in order that the government keep tabs on all those potential commie infiltrators such as Martin Luther King and John Lennon. And even quite recently, it was found that the authorities had peace activists under surveillance in the wake of 9/11. The Washington Post reported in 2006: A database managed by a secretive Pentagon intelligence agency called Counterintelligence Field Activity, or CIFA, was found last month to contain reports on at least four dozen antiwar meetings or protests, many of them on college campuses. Ten peace activists who handed out peanut butter and jelly sandwiches outside Halliburton’s headquarters in Houston in June 2004 were reported as a national security threat. So were people who assembled at a Quaker meeting house in Lake Worth, Fla., or protested military recruiters at sites such as New York University, the State University of New York and campuses of the University of California at Berkeley and at Santa Cruz. The protesters were written up under a Pentagon program called Talon, which is supposed to collect raw data on threats to defense facilities in the United States. CIFA, an agency created just under four years ago that now includes nine directorates and more than 1,000 employees, is charged with working to prevent terrorist attacks. The logic that peace activists must be in league with terrorists has never been adequately explained, but it follows along the same line of thought which leads conservatives to assume that decadent left-wing hippies are natural allies of Muslim fundamentalists. FYI- Many different types of anti-black surveillance KHALEK ‘13 (RANIA KHALEK, an independent journalist reporting on the underclass and marginalized who has written for Extra, The Nation, Al Jazeera America “Activists of Color Lead Charge Against Surveillance, NSA”, Truth-out.org, Published 30 October 2013, http://www.truth-out.org/news/item/19695activists-of-color-at-forefront-of-anti-nsa-movement, Accessed July 7th 2015, CMT) "We been exposed to this type of surveillance since we got here," declared Kymone Freeman, director of the National Black LUV Fest as he emceed the historic rally against NSA surveillance in Washington, DC. He continued, "Drones is [are] a form of surveillance. Racial profiling is a form of surveillance. Stop-and-frisk is a form of surveillance. We all black today!" Mass surveillance in communities of color increase the amount of minorities in the criminal justice system KHALEK ‘13 (RANIA KHALEK, an independent journalist reporting on the underclass and marginalized who has written for Extra, The Nation, Al Jazeera America “Activists of Color Lead Charge Against Surveillance, NSA”, Truth-out.org, Published 30 October 2013, http://www.truth-out.org/news/item/19695activists-of-color-at-forefront-of-anti-nsa-movement, Accessed July 7th 2015, CMT) Steven Renderos, national organizer for the Center for Media Justice, who helped put together the panel, told Truthout that examining the legacy of surveillance in communities of color could help lead to solutions. "It's critical to understand the history so we can learn how to dismantle it," Renderos said. "Those of us from marginalized communities grew up in environments very much shaped by surveillance, which has been utilized to ramp up the criminal justice system and increase deportations," Renderos said. "It's having real consequences in our communities where children are growing up without parents in the home and families are being torn apart through raids and deportations, a lot of which is facilitated through the use of surveillance." Panelist Fahd Ahmed, legal and policy director for the South Asian-led social justice organization Desis Rising Up and Moving, argued that mass surveillance is the predictable outgrowth of programs that have targeted marginalized communities for decades. "Just by the very nature of [the United States] being a settler-colonialist and capitalist nation, race and social control are central to its project," Ahmed said. "Anytime we see any levels of policing - whether it's day-to-day policing in the streets, surveillance by the police or internet surveillance - social control, particularly of those that resist the existing system, becomes an inherent part of that system." But, he warned, "These policies are not going to be limited to one particular community. They're going to continue to expand further and further" because "the surveillance has a purpose, which is to exert the power of the state and control the potential for dissent." Seema Sadanandan, program director for ACLU DC, acknowledged the collective resentment felt by people of color who are understandably frustrated that privacy violations are only now eliciting mass public outrage when communities of color have been under aggressive surveillance for decades. "The Snowden revelations represent a terrifying moment for white, middle-class and upper-middle-class people in this country, who on some level believe that the Bill of Rights and Constitution were protecting their everyday lives," The black community has and will always been surveilled, empirics prove Kayyali ’14 (Nadia Kayyali, Nadia earned a B.A. from UC Berkeley with a major in Cultural Anthropology and minored in Public Policy, “The History of Surveillance and the Black Community”, eff.com, published February 13, 2014, https://www.eff.org/deeplinks/2014/02/history-surveillance-and-blackcommunity, Accessed July 7th 2015, CMT) Government surveillance programs, most infamously the FBI’s “COINTELPRO”, targeted Black Americans fighting against segregation and structural racism in the 1950s and 60s. COINTELPRO, short for Counter Intelligence Program, was started in 1956 by the FBI and continued until 1971. The program was a systemic attempt to infiltrate, spy on, and disrupt activists in the name of “national security.” While it initially focused on the Communist Party, in the 1960s its focus expanded to include a wide swathe of activists, with a strong focus on the Black Panther Party and civil rights leaders such as Dr. Martin Luther King, Jr. FBI papers show that in 1962 “the FBI started and rapidly continued to gravitate toward Dr. King.” This was ostensibly because the FBI believed black organizing was being influenced by communism. In 1963 FBI Assistant Director William Sullivan recommended “increased coverage of communist influence on the Negro.” However, the FBI’s goal in targeting Dr. King was clear: to find “avenues of approach aimed at neutralizing King as an effective Negro leader,” because the FBI was concerned that he might become a “messiah.” Anti-Blackness Adv – Surveillance Bad Threat-constructing Surveillance rhetoric justifies racism as: “necessary for the common good”. This normalizes racism and makes it invisible even to its victims. Declaring Solidarity with the victims is necessary to solve this discrimination. Prison Culture ’13 (June 12 2013, Site dedicated to exposing racism of the military-industrial complex, “On (Some) Black People and the Surveillance State…”, http://www.usprisonculture.com/blog/2013/06/12/on-some-black-people-and-thesurveillance-state/ DA: 7/6/15 CB) Some black folks in my life have no patience for some white people’s new found interest/discovery of Cointelpro and particularly of their (now incessant) invocation of the FBI’s surveillance of Martin Luther King Jr. The interest seems to them instrumental and transactional. It’s as if folks who have had little concern about black people’s daily experiences of state violence are now demanding our support in safeguarding their rights. There has been no prior relationship or trust-building so some black folks are feeling used and exploited. It brings to mind the lyric: “Will you still love me, tomorrow?” This sentiment is understandable. As the revelations about NSA surveillance roil the political world, media outlets & others are suddenly very interested in Americans’ views on matters of privacy, civil liberties, and individual rights. A poll was released a few days ago. It apparently found that “blacks were more likely than whites and hispanics to consider the patriot act a necessary tool [that helps the government find terrorists] (58% to 42% and 40% respectively). On my Twitter timeline, several people mused about why this would be the case. After all, black people are the disproportionate targets of government surveillance at all levels (city, county, state, and federal). We’ve always been under the gaze of the state and we know that our rights are routinely violable. Moreover, we are used to these abuses being ignored by the majority of our fellow citizens. Shouldn’t black people then be the most opposed to violations of civil liberties and to laws that encroach on those liberties? Civil liberties and individual rights have different meanings for different groups of people. They also have different priorities depending on social contexts. A review of black history suggests that considerations of civil liberties are always embedded within concepts of equality and social justice. In other words by design or necessity, black people have focused on our collective rights over our individual liberties. This makes sense in a society where we don’t just assume individual black guilt and suspicion. We are all guilty and we are all suspicious (even if we may want to deny this reality). In that context, individual liberties and rights take a back seat to a collective struggle for emancipation and freedom. Additionally, as a people, we have always known that it is impossible for us to exercise our individual rights within a context of more generalized social, economic, and political oppression. Individual rights are necessarily rooted within a larger social context. Civil liberty concerns take a back seat to putting food on the table and to survival more generally. To guarantee our individual rights as black people, we know that we must address broader social concerns. We don’t have the luxury to ignore this fact. For others not to understand this reality is to foreclose on any opportunities to recruit more black people to the cause of dismantling the surveillance state. Returning to the poll: what might account for a majority of (polled) black people’s seeming ‘support’ of using the Patriot act to find ‘terrorists?’ Are they indirectly expressing their support for President Obama’s foreign policy through their response? It’s possible. Are some black people answering yes & perhaps hoping that concentrating on ‘terrorists’ might shift the focus away from the government’s targeting of African-Americans? Maybe. It isn’t crazy to think that if the government develops a new public enemy #1, it might lower its black people as threat matrix just a little bit. This is of course wishful thinking but it’s a plausible explanation. My personal hypothesis is that black people living in the U.S. are Americans and that we have, like millions of other Americans, bought into some of the law & order rhetoric espoused by the government. In this context, it should be unsurprising that some black people would express support for the Patriot act. Many other Americans do too. picimage2 Black people are disproportionately incarcerated in the U.S. Prisoners have no presumption of ‘privacy'; that idea is an abstraction. Blacks are disproportionately subjected to bodily searches and seizures through practices like stop and frisk. Stop and frisk is a neon ‘no tresspassing sign’ for young black people in particular. Unfortunately too many of us have become acclimated to the daily assaults on our persons and the trampling of our individual rights. Can you blame us? If you are a black woman, then you may have the direct experience of the state policing your body in various ways. Many of us resist policies intended to do this but some of us don’t (for a number of good and bad reasons). The examples that I have cited suggest that for most of us (black people) government surveillance and being perceived as threats are a daily fact of life; not an academic/analytical exercise. Many black people living in public housing, for example, can attest to the fact that they aren’t seen as having any privacy rights when law enforcement routinely kicks down their doors supposedly looking for narcotics. The vast majority of the country accepts these “law and order” practices as the price of “freedom” and “safety.” The outcry against mass incarceration and stop & frisk is still overwhelmingly confined to people of color and other marginalized communities like LGBTQ individuals. Yet even in those communities, many have become inured to the routine violations of rights and liberties. In order to have an elusive sense of “safety,” we are told by politicians and law enforcement that these practices are necessary and that they are in fact “color-blind.” We mostly swallow their propaganda. It doesn’t matter that incarceration and intense policing & surveillance are actually decimating black communities. Black people know that the state and its gatekeepers exert their control over all aspects of our lives. So when we mention that the NSA surveillance regime isn’t new to us, the appropriate response is not to mock, ridicule, belittle and berate. No. The response that conveys solidarity and a desire to partner is to say: “Yes that’s true and while I may have been personally concerned about these issues, I am sorry that more of my peers haven’t been outraged for years. How can we work together to dismantle the surveillance state that harms us all?” Check your privilege, please. Anti-Blackness ADv – Colorblindness Bad Colorblindness is the experiences of different racial groups become overlooked. Hobson ‘15 Mellody Hobson is an American businesswoman who is the president of Ariel Investments and the current Chairman of the Board of Directors of Dreamworks Animation. Feburary 3 2015. “Colorblindness vs. ColorBRAVE”. Progressive Pupil. https://progressivepupil.wordpress.com/2015/02/03/colorblindess-vs-colorbrave/. July 9, 2015 In her Ted Talk, Mellody Hobson, a Financial Executive, discusses her stance on colorblindness. She opens the Ted Talk by acknowledging that race in our country is an uncomfortable subject. However, by using her personal experiences as a successful Black women in a field dominated by White men, she provides compelling arguments as to why we should no longer be colorblind, but start the conversation of race in the workplace. Colorblindness is a term used to describe one’s ability or choice to disregard and/or overlook race. Variations of phrases similar to “I don’t see color” are distinct examples. As Hobson points out, avoiding the topic of race is not the answer, for it mutes the discussion of diversity and inclusiveness ultimately. This neglects a significance piece of one’s identity. I personally remember a time when the people around me chose to be colorblind. It was my freshman year of high school, and I was the only Black person on our cheerleading team. One of our away games took place in a very conservative town in North Georgia. There were approximately fifteen people of color in the entire gym, including the members of our basketball team and their families. At some point, the game got heated; racial slurs and threats were exchanged to the Black basketball players and myself. Yes I was upset in that moment, but I remember feeling more disappointed that the other cheerleaders chose it act like it didn’t happen. My race was never discussed during practices or at games. The only reference to my color would arise while trying to explain to my coaches that my hair does not curl while in box braids. My teammates and coaches chose to overlook the difference in my hair, just like they did during the Georgia situation. I wanted them to acknowledge that my Blackness made me a victim to racial threats. So no, they did not spit out the racial slurs, but choosing to not acknowledge my race and the experiences that come with it, is form of racism. While some choose to be colorblind, others seem to be on the opposite end of the extreme by being color conscious. Color Consciousness is when one thinks they are aware of someone’s reality due to the assumptions they have about their race. While I do think it’s important to be aware of race, assuming to know anyone’s reality without being that person can be offensive. During her Ted Talk Hobson stated that she was recently mistaken for kitchen help. Though I don’t have details about the situation, I believe her skin color played a role is one’s decision to mistake her as kitchen help. Concluding her Ted Talk Hobson challenged us to be Colorbrave. We have to start creating spaces where we can have these difficult conversations. As Hobson stated if we don’t begin this conversation about race and discrimination it threatens to rob another generation of all the opportunities wanted for them regardless of the color of their skin. Colorblindness isn’t actually color blind; it’s a hidden form of racism. Color consciousness is better. Wilkins ‘96 David Wilkins is the Lester Kissel Professor of Law, and Faculty Director of the Program on the Legal Profession and the Center on Lawyers and the Professional Services Industry at Harvard Law School. He is a Senior Research Fellow of the American Bar Foundation, the Harvard Law School's Vice Dean for Global Initiatives on the Legal Profession, and a Faculty Associate of the Harvard University Edmond J. Safra Foundation Center for Ethics. “Color Conscious: The Political Morality of Race” https://thenatureofrace.files.wordpress.com/2014/01/color-conscious-the-political-morality-of-race-copy.pdf. July 9, 2015. Not only are we as a nation destined to fail to solve the problem of the color-line in this century, but we are in danger of losing our ability even to talk about the subject intelligently. Far too often, speakers on both sides of contemporary debates about race acknowledge only half of America’s complex racial legacy. Those who oppose taking race into account, for example, when awarding benefits or designing educational curricula, point to the fact that our political institutions rest on principles of individual freedom and equality that expressly deny the moral or political significance of ascriptive characteristics such as race. Echoing Justice Harlan’s famous dissent in Plessy v. Fergusson, these advocates passionately assert that “our Constitution is color blind,” and morality is as well.2 Supporters of affirmative action or multiculturalism, on the other hand, cite the fact that Americans— frequently acting in the name of individual freedom and equality—exterminated the indigenous Native American population, kidnapped and enslaved millions of Africans, held JapaneseAmericans (but not German-Americans) in internment camps during World War II, and, from 1790 to 1952, restricted legal naturalization to “white” persons. For these advocates, “color blindness” in our political and moral discourse has been little more than a smoke screen for the pervasive “color consciousness” (and, more specifically, white supremacy) that has been a dominant feature of the American saga since the Pilgrims first landed on Plymouth Rock. Given this dual legacy, it is not surprising, as Anthony Appiah observes in his thoughtful epilogue to this volume, that so much of what is said today about race is “dishonest, confused, illinformed, unhelpful.” If we are to fare any better on Du Bois’s challenge in the next century, we must create a discourse about race that acknowledges both parts of America’s racial heritage. This volume is an attempt to create such a discourse. It does so by bringing together two leading scholars and, to quote Appiah again, “passionate democrats,” to ask the kind of probing and critical questions about the meaning and significance of race that are rarely addressed in our sound bite culture. Each author brings a wealth of experience and expertise to the task. Anthony Appiah has written extensively about a wide range of topics relating to African and African-American intellectual history and literary studies, ethics, and the philosophy of mind and language. Amy Gutmann is one of the country’s leading scholars in the fields of democratic theory, ethics, and public education. In the essays that follow, both these accomplished authors strive to give an account of race in contemporary American society that pays due regard both to the promise of America’s ideals and to its persistent failure to live up to these noble aspirations. Appiah’s essay, entitled “Race, Culture, Identity: Misunderstood Connections,” explores the role of race in the formation of individual identity. His central claim is that the concept of race 2 Plessy v. Fergusson, 163 U.S. 537 (1896), p. 559. 4 INTRODUCTION: THE CONTEXT OF in this country neither adequately explains existing American social distinctions nor properly acts as a surrogate for culture or identity. Although America’s history of racial oppression creates a role for “racial identities,” Appiah concludes, if we are ever to realize the promise of individual freedom and equality embedded in the other part of our racial heritage, “we shall have, in the end, to move beyond current racial identities.” In “Responding to Racial Injustice,” Amy Gutmann brings the two parts of America’s RACE developed racial dilemma together to provide a “color blind” argument in favor of “color consciousness” in public policy. Gutmann argues that in order to treat individuals fairly, the ultimate goal of a just society, it will sometimes be necessary to enact color conscious policies that recognize the extent to which race continues to influence the life chances of citizens. At the same time, Gutmann insists, these policies must also be consistent with the truth about color blindness that all persons, regardless of their skin color, are civic equals. Only those color conscious public policies that are both instrumentally valuable to overcoming racial injustice and consistent with the fundamental equality of all human beings, Gutmann concludes, are justifiable in a democracy that hopes one day to live up to its professed ideals. Color Consciousness is superior to color blindness. Chaky 14 Chris Chaky, Muhlenberg College, Politics Department, Undergraduate. Studies History, International Relations, and Cultural Studies. “Thoughts of Color Conscious.” July 7 2014. Contemporary Racism. http://contemporaryracism.org/2744/thoughts-oncolor-consciousness/. July 9, 2015 The recent literature in social psychology and other disciplines is clear: colorblind racial ideology is a harmful way of viewing the world. By ignoring both the material disadvantages faced by people of color and the implicit racial biases that influence decision-making, subscribing to colorblind racial ideology leads people to ignore the realities of racism in modern America and thus oppose policies that would address racial inequalities. In a recent class, we discussed how some white people who subscribe to such an ideology will go to any length to avoid mentioning a person of color’s race. This avoidance occurs despite the fact that, in all likelihood, this person is thinking about the person of color’s race. Research has shown that people who practice this kind of avoidance are perceived by many people of color as more racially biased. The solution to colorblindness, then, is color-consciousness, which involves the active acknowledgment of race. One should not actively ignore the race of a person of color; one should feel free to discuss it. It is this recognition that can lead to an overcoming of system and implicit racial bias. All of this sounds good, but there is one issue I want to raise. It occurred to me that subscribing to a color-conscious ideology might be problematic if one only recognizes the races of people of color and ignores the race of white people. This reinforces white normativity, the idea that white is the default or normal identity in America. Any other race is different and even less American. How would this play out in the real world? Interpersonally, it could mean not just refusing to avoid using the race of people of color as a descriptor (granted, it should never be the only descriptor) but also actively using the race of white people as a descriptor. It could mean that one could discuss the effect race has not only on black politicians but also on white politicians. Do you think this is a good idea? Would such a strategy be able to gradually chip away at the dominance of white normativity? My reasoning is that calling attention to the fact that white Americans are in fact white will reduce the tendency to automatically associate white with American. It could also call attention to white privilege and not just the subordination of people of color. Racial color blindness is a form of modern day racism. Neville 11 Helen Neville Professor, Department of Psychology B.A., University of British Columbia M.A., Simon Fraser University Ph.D., Cornell University. August 17 2011. “Color-Blind Racial Ideology” http://studysites.sagepub.com/healeyregc6e/study/chapter/encycarticles/ch11/NEVILL~1.PDF. July 9, 2015 Over the past 2 decades scholars and popular authors have written about racial color-blindness as a way to characterize racial beliefs in the post–civil rights era. At its core, racial color-blindness refers to the belief that racism is a thing of the past and that race no longer plays a role in understanding people’s lived experience. Conceptually, racial color-blindness has its roots in the law field and traditionally has been applied mainly to the Constitution. More recently, scholars have redefined the term to better capture the new social relations within the current racial climate. As early as 1997, the field of psychology questioned the underlying assumption that ignoring race and color was a desirous and appropriate approach to interracial interactions. In a pamphlet on color-blind racial attitudes, the American Psychological Association (APA) concluded that “research conducted for more than two decades strongly supports the view that we cannot be, nor should we become, color-blind” (p. 3). The APA further provided a critique of the color-blind perspective, arguing that a color-blind approach “ignores research showing that, even among well-intentioned people, skin color . . . figures prominently in everyday attitudes and behavior” (p. 2). The APA thus argued that to get beyond racism it is essential to take into account differences between the lived experiences of people. There are a number of complementary but competing definitions of racial color-blindness. Couching racial color-blindness as an expression of modern-day racism, sociologist Eduardo Bonilla-Silva identified four frames or types: abstract liberalism (i.e., emphasizing political liberalism and the availability of equal opportunities to everyone, regardless of race, and the belief that political/economic interventions only serve to create a schism between racial groups); naturalism (i.e., interpreting racial clustering as a natural and preferred occurrence); cultural (i.e., using essentialist arguments to explain racial disparities, thus rooting racial differences in cultural practices); and minimization of racism in today’s society. Ruth Frankenberg, also a sociologist, viewed racial color-blindness as a perspective consisting of two types: color-evasion (i.e., placing an emphasis on racial sameness to the detriment of seeing or acknowledging differences in experiences and political realities) and power-evasion (i.e., the belief that resources are fairly distributed to everyone and success is attributed to individual effort). In the Guidelines on Multicultural Education, Training, Research, Practice, and Organizational Change for Psychologists, authored by the APA, the interpersonal aspects of racial colorblindness are emphasized. Based on this perspective potential racial differences are minimized in favor of universal or human experiences. There is a great deal of commonality across cultures; however, the color-blind perspective dismisses potential differences based on racial group membership and downplays how these differences may shape human experiences. This limited awareness of the manifestation of race and racism in society is the foundation for most conceptualizations of racial color-blindness. Regardless of the definition, racial color-blindness is also thought to help justify existing racial practices or policies that ultimately create and support existing racial inequalities. Consistent with these articulations, researchers argue that racial color-blindness reflects a broader ideological stance. Racial ideology is complex, but essentially it can be conceptualized as a global term referring to the dominant views about race within a hierarchical society. Ideology in this regard consists of a shared worldview about race that helps to justify and legitimize the current racial status quo; it accounts for individual beliefs and dominant societal racial beliefs or ideas that are commonly understood and transmitted through a variety of civil society and structural mechanisms. From this perspective racial color-blind ideology is a set of commonly held beliefs that minimize and distort the existence of institutional racism. This perspective is most consistent with the minimization type of color-blind racism identified by Bonilla-Silva and the power-evasion type proffered by Frankenberg. Recently, scholars have challenged the assumption of the emergence of a new racism. Based on the review of the interdisciplinary literature in the United States and in other English-speaking countries, Colin Wayne Leach concluded that old-fashioned racism or the endorsement of racial inferiority/superiority ideology and actions have not been supplanted by more covert forms of racial expressions. Although he did not name racial color-blindness in his critique, Leach raised questions about whether or not a shift has occurred in the manifestation of racism since the passage of civil rights laws. In sum, racial colorblindness is premised on the persistence of racism as manifested in contemporary racial disparities across a range of indexes, including housing, health, and employment. The complex set of beliefs used to restrict awareness of the persistence of racism is part of a larger ideological stance that serves to legitimize and further perpetuate racial inequalities. There is some debate about whether racial colorblindness is a new phenomenon or whether it reflects a dimension of racism that, until relatively recently, has received attention in the social science literature. Color blindness causes racial backgrounds, ethnic stories, heritage, and culture to be destroyed. Williams 11 Monnica T Williams received her Master's and Doctoral Degrees in clinical psychology from the University of Virginia, where she conducted research in the areas of psychopathology, tests and measurement, and ethnic differences,Dec 27, 2011 Psychology Today, ‘’Colorblind Ideology Is a Form of Racism’’, https://www.psychologytoday.com/blog/culturallyspeaking/201112/colorblind-ideology-is-form-racism, Date Accessed; July 9th, 2015 Racial issues are often uncomfortable to discuss and rife with stress and controversy. Many ideas have been advanced to address this sore spot in the American psyche. Currently, the most pervasive approach is known as colorblindness. Colorblindness is the racial ideology that posits the best way to end discrimination is by treating individuals as equally as possible, without regard to race, culture, or ethnicity. At its face value, colorblindness seems like a good thing — really taking MLK seriously on his call to judge people on the content of their character rather than the color of their skin. It focuses on commonalities between people, such as their shared humanity. However, colorblindness alone is not sufficient to heal racial wounds on a national or personal level. It is only a half-measure that in the end operates as a form of racism . Racism? Strong words, yes, but let's look the issue straight in its partially unseeing eye. In a colorblind society, White people, who are unlikely to experience disadvantages due to race, can effectively ignore racism in American life, justify the current social order, and feel more comfortable with their relatively privileged standing in society (Fryberg, 2010). Most minorities, however, who regularly encounter difficulties due to race, experience colorblind ideologies quite differently. Colorblindness creates a society that denies their negative racial experiences, rejects their cultural heritage, and invalidates their unique perspectives . Let's break it down into simple terms: Color-Blind = "People of color — we don't see you (at least not that bad ‘colored' part)." As a person of color, I like who I am, and I don't want any aspect of that to be unseen or invisible . The need for colorblindness implies there is something shameful about the way God made me and the culture I was born into that we shouldn't talk about. Thus, colorblindness has helped make race into a taboo topic that polite people cannot openly discuss. And if you can't talk about it, you can't understand it, much less fix the racial problems that plague our society. Many Americans view colorblindness as helpful to people of color by asserting that race does not matter (Tarca, 2005). But in America, most underrepresented minorities will explain that race does matter, as it affects opportunities, perceptions, income, and so much more. When race-related problems arise, color blindness tends to individualize conflicts and shortcomings, rather than examining the larger picture with cultural differences, stereotypes, and values placed into context . Instead of resulting from an enlightened (albeit well-meaning) position, color blindness comes from a lack of awareness of racial privilege conferred by Whiteness (Tarca, 2005). White people can guiltlessly subscribe to colorblindness because they are usually unaware of how race affects people of color and American society as a whole. How might colorblindness cause harm? Here's an example close to home for those of you who are psychologically-minded. In the not-so-distant past, in psychotherapy a client's racial and ethnic remarks were viewed as a defensive shift away from important issues, and the therapist tended to interpret this as resistance (Comas-Diaz & Jacobsen, 1991). However, such an approach hinders the exploration of conflicts related to race, ethnicity, and culture. The therapist doesn't see the whole picture, and the client is left frustrated. A colorblind approach effectively does the same thing. Blind means not being able to see things. I don't want to be blind. I want to see things clearly, even if they make me uncomfortable . As a therapist I need to be able to hear and "see" everything my client is communicating on many different levels. I can't afford to be blind to anything. Would you want to see a surgeon who operated blindfolded? Of course not. Likewise, a therapist should not be blinded either, especially to something as critical as a person's culture or racial identity. By encouraging the exploration of racial and cultural concepts, the therapist can provide a more authentic opportunity to understand and resolve the client's problems (Comas-Diaz & Jacobsen, 1991). Nonetheless, I have encountered many fellow therapists who ascribe to a colorblind philosophy. They ignore race or pretend its personal, social, and historical effects don't exist. This approach ignores the incredibly salient experience of being stigmatized by society and represents an empathetic failure on the part of the therapist. Colorblindness does not foster equality or respect; it merely relieves the therapist of his or her obligation to address important racial differences and difficulties. Research has shown that hearing colorblind messages predict negative outcomes among Whites, such as greater racial bias and negative affect; likewise colorblind messages cause stress in ethnic minorities, resulting in decreased cognitive performance (Holoien et al., 2011). Given how much is at stake, we can no longer afford to be blind. It's time for change and growth. It's time to see. The alternative to colorblindness is multiculturalism, an ideology that acknowledges, highlights, and celebrates ethnoracial differences. It recognizes that each tradition has something valuable to offer. It is not afraid to see how others have suffered as a result of racial conflict or differences. So, how do we become multicultural? The following suggestions would make a good start (McCabe, 2011): Recognizing and valuing differences, Teaching and learning about differences, and Fostering personal friendships and organizational alliances, Moving from colorblindness to multiculturalism is a process of change, and change is never easy, but we can't afford to stay the same . Color blindness promotes a ''post-racial'' society that excludes the history of people of color. Iweala 08 Uzodinma Iweala is the author of "Beasts of No Nation," a novel about child soldiers in Africa, January 23,2008, Los Angeles Times, ''Race still matters'' http://articles.latimes.com/2008/jan/23/opinion/oe-iweala23 Date Accessed; July 9th 2015 I am shocked by the commentary on the prominence of race as a theme in the Democratic Party primaries. Shocked not because race is a theme but because so many in the media seem to think that race would not be or should not be mentioned. It is as if we think that not speaking about race is the equivalent of making progress on race issues. The only thing more amusing than the use of a new term, "post-racial," to describe the positive response to Barack Obama's campaign is the lamentation at the loss of "post-raciality." This entire narrative is a media-concocted fiction. America is decidedly not "post-racial ." One need only observe the prosecution of the Duke University lacrosse team or the Jena Six, the debate about race-based affirmative action and the atrocity that was and is Hurricane Katrina to know that racial issues are still with us. The desire that the subject of race be set aside in the current "post-racial" political conversation shows that society is unwilling to openly face its worst fear: Not only could a black man ably lead this nation, but the mere fact of a black president would force both the majority and minority populations to reset our parameters for normality. Some (perhaps many) white Americans don't think it's normal for a black person to be successful; their stereotypes can't accommodate the fact of a black person having gone to Harvard and achieved some prominence. As an African American writer, I am reminded of this each time I finish a reading, when without fail a white person overzealously praises my speaking ability. The most recent version of this was a 15-yearold high school student who was amazed that I had actually attended college. Also telling is Obama's initial lack of support in the black community, which may have been a result of an African American unwillingness to see him as representative of traditional (very different from stereotypical) black America. The majority of Americans are comfortable accepting successful blacks in stereotypically prescribed fields such as entertainment or sports, where blacks are expected to be physically and emotionally strong and yet largely politically mute. When a black person becomes successful in another field, he or she becomes a "surprise" to the majority and is subsequently stripped of color. How many times have you heard a white person say that he or she thinks of Obama not as a black man but as a man, or of Oprah not as a black woman but as just, well, Oprah? I have lost count. This well-meaning, praise-expectant affirmation of colorblindness may seem like progress, but it's really indicative of having avoided the central issue: Someone who looks different (read black) could be just as qualified, just as deserving as a "normal" person (read white). The in-your-face, un-stereotypical blackness of Obama therefore forces all of us to question our ideas of race and racial progress in a way that makes us work. This type of work is difficult and scary, and it's understandable why some would rather delay the discussion or label it unnecessary and unproductive. But having this discussion will allow us to grow stronger as a country. Obama's presence forces us to ask whether it is reasonable to call a biracial man black; whether definitions of race designed to benefit slave-owners are still necessary and valid in 2008. His openness about past drug use could put front and center the debate about the patently racist sentencing guidelines our "post-racial" society employs to punish narcotics- related offenses. In general, Barack Hussein Obama brings us face to face with the discomfort our society feels with this idea of difference. Indeed, fascination with Obama's name recalls studies that show how hard it is for those with unique African American names to find employment. And it is interesting that no one has mentioned an obvious reason for the Obama campaign's initial reluctance to attack Hillary Rodham Clinton -- that it might conjure up the age-old assumption that aggressive young black men are a menace to older white women. (If that statement offends you, I'm sure plenty of young black men like myself can tell you about older white women crossing the street to avoid us in our "post-racial" society.) Even if we were to confront head-on these and other questions surrounding race, we are unlikely to grow into the "post-racial" modifier some of us so crave. That's because the idea of "post-raciality" is a total fallacy. Should Obama become president, he will not suddenly cease to be black, nor will white Americans be any less white. However, Obama's continual presence in our newspapers, on television and in our national consciousness would force us to reconsider just what these colors mean. A President Obama (or any other black president) would bring us face to face with the threatening idea that colorblindness and equality are not the same, and that real progress on racial issues means respect for, and not avoidance of, difference. Our racial past and future is something that we Americans must address. Thanks to Obama, there is no better time than now. Color-blindness is the new arise form of racism to oppress people of color. Neville 11 Helen. A Neville is a Professor in the Departments of Educational Psychology and African American Studies at the UIUC. August 17, 2011, ''SAGE PUBLICATIONS'' http://dx.doi.org/10.4135/9781412963978.n343 Date accessed; July 9, 2015 Recently, scholars have challenged the assumption of the emergence of a new racism. Based on the review of the interdisciplinary literature in the United States and in other Englishspeaking countries, Colin Wayne Leach concluded that old-fashioned racism or the endorsement of racial inferiority/superiority ideology and actions have not been supplanted by more covert forms of racial expressions. Although he did not name racial color-blindness in his critique, Leach raised questions about whether or not a shift has occurred in the manifestation of racism since the passage of civil rights laws. In sum, racial color-blindness is premised on the persistence of racism as manifested in contemporary racial disparities across a range of indexes, including housing, health, and employment. The complex set of beliefs used to restrict awareness of the persistence of racism is part of a larger ideological stance that serves to legitimize and further perpetuate racial inequalities. There is some debate about whether racial colorblindness is a new phenomenon or whether it reflects a dimension of racism that, until relatively recently, has received attention in the social science literature. Islamophobia Adv Uniqueness – Islamophobic Targeting Now Islamophobic targeting by the FBI is rampant now. Unegbu, Howard University JD candidate, 2013 [Cindy, 57 How. L.J. 433, “NOTE AND COMMENT: National Security Surveillance on the Basis of Race, Ethnicity, and Religion: A Constitutional Misstep” Lexis, accessed 7-6-15, TAP] In accordance with its surveillance and national security investigation power, the FBI has conducted various undercover monitoring procedures that call into question their constitutional permissibility. 115Link to the text of the note In 2009, the FBI participated in a career day event conducted in San [451] Jose, CA sponsored by an Assyrian community organization. 116Link to the text of the note The FBI's observations were placed in a mapping report. 117Link to the text of the note In the report, the FBI recited information about the organization's activities, the identities of several leaders within the organization, and the content of conversations at the event. 118Link to the text of the note This content included opinions, backgrounds, travel histories, educations, occupations, and charitable activities. 119Link to the text of the note Similarly, a memo submitted by the Sacramento Division of the FBI details a conversation in which an undercover agent discusses the Saudi Student Association with an innocent California State University student. 120Link to the text of the note The conversation included the organization's size, purpose, and activities. 121Link to the text of the note The memo, which included the student's social security number, telephone number, and address, was submitted to the FBI in Washington, DC. 122Link to the text of the note Additionally, in San Francisco, the FBI submitted a 2007 and 2008 report that detailed FBI spy efforts at Ramadan Iftar dinners. 123Link to the text of the note In the reports, the FBI documented the names of attendees, the contents of various conversations and presentations, a photo of dinner participants, and other information. 124Link to the text of the note Both of the reports indicate that the information was disseminated outside of the FBI. 125Link to the text of the note There are several other instances, similar to these, in which the FBI utilized individuals' race or ethnicity as a basis for monitoring. 126Link to the text of the note The American Civil Liberties Union and [452] other organizations have protested the wide-sweeping authority that has been granted to the national government to monitor domestic individuals, especially those that are not suspected of terrorism or criminal activity. 127Link to the text of the note Furthermore, the government has received criticism in the past for misusing its surveillance authority. 128Link to the text of the note In March of 2007, the Director of the FBI, Robert Mueller III, acknowledged that the bureau had improperly used the Patriot Act to obtain surveillance information. 129Link to the text of the note An investigation into the government's surveillance practices found that national security letters, which allow the bureau to obtain records from telephone companies, internet service providers, banks, credit companies, and other businesses without a judge's approval, were improperly, and sometimes illegally, used. 130Link to the text of the note Additionally, incorrect recordkeeping was exposed, in which the actual number of national security letters utilized were frequently understated when reported to Congress. 131Link to the text of the note Several legislatures have expressed concern about the misuse of government surveillance. 132Link to the text of the note It is apparent that this concern is not misguided since the Justice Department's Office of the Inspector General noted, in a 2007 audit report, that many FBI failures had occurred as a result of its surveillance procedures. 133Link to the text of the note These failures include a lack of internal controls 134Link to the text of the note and the absence of required information in national security letter approval memoranda. 135Link to the text of the note Critics of the government's surveillance procedures assert that the broad monitoring authority given to the government not only is unconstitutional because of a lack of checks and balances that would [453] allow for proper controls of the monitoring of citizens, 136Link to the text of the note but also because it has the effect of inappropriately singling out individuals for no other reason than their race or ethnicity. 137Link to the text of the note Therefore, the surveillance power given to the government and the anti-terrorist domestic monitoring procedures must be analyzed to determine their constitutional permissibility. NYPD’s undercover operation have been targeting Muslims and other minorities APUZZO AND GOLDMAN ’11 (matt and adam, , “With CIA help, NYPD moves covertly in Muslim areas,”8/23,Associated Press, With CIA help, NYPD moves covertly in Muslim areas, LS) In New Brunswick, N.J., a building superintendent opened the door to apartment No. 1076 one balmy Tuesday and discovered an alarming scene: terrorist literature strewn about the table and computer and surveillance equipment set up in the next room. The panicked superintendent dialed 911, sending police and the FBI rushing to the building near Rutgers University on the afternoon of June 2, 2009. What they found in that first-floor apartment, however, was not a terrorist hideout but a command center set up by a secret team of New York Police Department intelligence officers. From that apartment, about an hour outside the department's jurisdiction, the NYPD had been staging undercover operations and conducting surveillance throughout New Jersey. Neither the FBI nor the local police had any idea. Since the terrorist attacks of Sept. 11, 2001, the NYPD has become one of the country's most aggressive domestic intelligence agencies. A months-long investigation by The Associated Press has revealed that the NYPD operates far outside its borders and targets ethnic communities in ways that would run afoul of civil liberties rules if practiced by the federal government. And it does so with unprecedented help from the CIA in a partnership that has blurred the bright line between foreign and domestic spying. Neither the city council, which finances the department, nor the federal government, which contributes hundreds of millions of dollars each year, is told exactly what's going on. The department has dispatched teams of undercover officers, known as "rakers," into minority neighborhoods as part of a human mapping program, according to officials directly involved in the program. They've monitored daily life in bookstores, bars, cafes and nightclubs. Police have also used informants, known as "mosque crawlers," to monitor sermons, even when there's no evidence of wrongdoing. NYPD officials have scrutinized imams and gathered intelligence on cab drivers and food cart vendors, jobs often done by Muslims. Many of these operations were built with help from the CIA, which is prohibited from spying on Americans but was instrumental in transforming the NYPD's intelligence unit. A veteran CIA officer, while still on the agency's payroll, was the architect of the NYPD's intelligence programs. The CIA trained a police detective at the Farm, the agency's spy school in Virginia, then returned him to New York, where he put his new espionage skills to work inside the United States. And just last month, the CIA sent a senior officer to work as a clandestine operative inside police headquarters. While the expansion of the NYPD's intelligence unit has been well known, many details about its clandestine operations, including the depth of its CIA ties, have not previously been reported. The NYPD denied that it trolls ethnic neighborhoods and said it only follows leads. In a city that has repeatedly been targeted by terrorists, police make no apologies for pushing the envelope. NYPD intelligence operations have disrupted terrorist plots and put several would-be killers in prison. "The New York Police Department is doing everything it can to make sure there's not another 9/11 here and that more innocent New Yorkers are not killed by terrorists," NYPD spokesman Paul Browne said. "And we have nothing to apologize for in that regard." But officials said they've also been careful to keep information about some programs out of court, where a judge might take a different view. The NYPD considers even basic details, such as the intelligence division's organization chart, to be too sensitive to reveal in court. One of the enduring questions of the past decade is whether being safe requires giving up some liberty and privacy. The focus of that debate has primarily been federal programs like wiretapping and indefinite detention. The question has received less attention in New York, where residents do not know for sure what, if anything, they have given up. The story of how the NYPD Intelligence Division developed such aggressive programs was pieced together by the AP in interviews with more than 40 current and former New York Police Department and federal officials. Many were directly involved in planning and carrying out these secret operations for the department. Though most said the tactics were appropriate and made the city safer, many insisted on anonymity, because they were not authorized to speak with reporters about security matters. The story begins with one man. David Cohen arrived at the New York Police Department in January 2002, just weeks after the last fires had been extinguished at the debris field that had been the twin towers. A retired 35-year veteran of the CIA, Cohen became the police department's first civilian intelligence chief. Cohen had an exceptional career at the CIA, rising to lead both the agency's analytical and operational divisions. He also was an extraordinarily divisive figure, a man whose sharp tongue and supreme confidence in his own abilities gave him a reputation as arrogant. Cohen's tenure as head of CIA operations, the nation's top spy, was so contentious that in 1997, The New York Times editorial page took the unusual step of calling for his ouster. He had no police experience. He had never defended a city from an attack. But New York wasn't looking for a cop. "Post-9/11, we needed someone in there who knew how to really gather intelligence," said John Cutter, a retired NYPD official who served as one of Cohen's top uniformed officers. At the time, the intelligence division was best known for driving dignitaries around the city. Cohen envisioned a unit that would analyze intelligence, run undercover operations and cultivate a network of informants. In short, he wanted New York to have its own version of the CIA. Cohen shared Commissioner Ray Kelly's belief that 9/11 had proved that the police department could not simply rely on the federal government to prevent terrorism in New York. "If anything goes on in New York," one former officer recalls Cohen telling his staff in the early days, "it's your fault." Among Cohen's earliest moves at the NYPD was making a request of his old colleagues at CIA headquarters in Langley, Va. He needed someone to help build this new operation, someone with experience and clout and, most important, someone who had access to the latest intelligence so the NYPD wouldn't have to rely on the FBI to dole out information. CIA Director George Tenet responded by tapping Larry Sanchez, a respected veteran who had served as a CIA official inside the United Nations. Often, when the CIA places someone on temporary assignment, the other agency picks up the tab. In this case, three former intelligence officials said, Tenet kept Sanchez on the CIA payroll. When he arrived in New York in March 2002, Sanchez had offices at both the NYPD and the CIA's station in New York, one former official said. Sanchez interviewed police officers for newly defined intelligence jobs. He guided and mentored officers, schooling them in the art of gathering information. He also directed their efforts, another said. There had never been an arrangement like it, and some senior CIA officials soon began questioning whether Tenet was allowing Sanchez to operate on both sides of the wall that's supposed to keep the CIA out of the domestic intelligence business. "It should not be a surprise to anyone that, after 9/11, the Central Intelligence Agency stepped up its cooperation with law enforcement on counterterrorism issues or that some of that increased cooperation was in New York, the site of ground zero," CIA spokeswoman Jennifer Youngblood said. Just as at the CIA, Cohen and Sanchez knew that informants would have to become the backbone of their operation. But with threats coming in from around the globe, they couldn't wait months for the perfect plan. They came up with a makeshift solution. They dispatched more officers to Pakistani neighborhoods and, according to one former police official directly involved in the effort, instructed them to look for reasons to stop cars: speeding, broken tail lights, running stop signs, whatever. The traffic stop gave police an opportunity to search for outstanding warrants or look for suspicious behavior. An arrest could be the leverage the police needed to persuade someone to become an informant. For Cohen, the transition from spying to policing didn't come naturally, former colleagues said. When faced with a decision, especially early in his tenure, he'd fall back on his CIA background. Cutter said he and other uniformed officers had to tell Cohen, no, we can't just slip into someone's apartment without a warrant. No, we can't just conduct a search. The rules for policing are different. While Cohen was being shaped by the police department, his CIA background was remaking the department. But one significant barrier stood in the way of Cohen's vision. Since 1985, the NYPD had operated under a federal court order limiting the tactics it could use to gather intelligence. During the 1960s and 1970s, the department had used informants and undercover officers to infiltrate anti-war protest groups and other activists without any reason to suspect criminal behavior. To settle a lawsuit, the department agreed to follow guidelines that required "specific information" of criminal activity before police could monitor political activity. In September 2002, Cohen told a federal judge that those guidelines made it "virtually impossible" to detect terrorist plots. The FBI was changing its rules to respond to 9/11, and Cohen argued that the NYPD must do so, too. "In the case of terrorism, to wait for an indication of crime before investigating is to wait far too long," Cohen wrote. U.S. District Judge Charles S. Haight Jr. agreed, saying the old guidelines "addressed different perils in a different time." He scrapped the old rules and replaced them with more lenient ones. It was a turning point for the NYPD.With his newfound authority, Cohen created a secret squad that would soon infiltrate Muslim neighborhoods, according to several current and former officials directly involved in the program.The NYPD carved up the city into more than a dozen zones and assigned undercover officers to monitor them, looking for potential trouble. At the CIA, one of the biggest obstacles has always been that U.S. intelligence officials are overwhelmingly white, their mannerisms clearly American. The NYPD didn't have that problem, thanks to its diverse pool of officers. Using census data, the department matched undercover officers to ethnic communities and instructed them to blend in, the officials said. Pakistani-American officers infiltrated Pakistani neighborhoods, Palestinians focused on Palestinian neighborhoods. They hung out in hookah bars and cafes, quietly observing the community around them. The unit, which has been undisclosed until now, became known inside the department as the Demographic Unit, former police officials said. "It's not a question of profiling. It's a question of going where the problem could arise," said Mordecai Dzikansky, a retired NYPD intelligence officer who said he was aware of the Demographic Unit. "And thank God we have the capability. We have the language capability and the ethnic officers. That's our hidden weapon." The officers did not work out of headquarters, officials said. Instead, they passed their intelligence to police handlers who knew their identities. Cohen said he wanted the squad to "rake the coals, looking for hot spots," former officials recalled. The undercover officers soon became known inside the department as rakers. A hot spot might be a beauty supply store selling chemicals used for making bombs. Or it might be a hawala, a broker that transfers money around the world with little documentation. Undercover officers might visit an Internet cafe and look at the browsing history on a computer, a former police official involved in the program said. If it revealed visits to radical websites, the cafe might be deemed a hot spot. Ethnic bookstores, too, were on the list. If a raker noticed a customer looking at radical literature, he might chat up the store owner and see what he could learn. The bookstore, or even the customer, might get further scrutiny. If a restaurant patron applauds a news report about the death of U.S. troops, the patron or the restaurant could be labeled a hot spot. The goal was to "map the city's human terrain," one law enforcement official said. The program was modeled in part on how Israeli authorities operate in the West Bank, a former police official said. Mapping crimes has been a successful police strategy nationwide. But mapping robberies and shootings is one thing. Mapping ethnic neighborhoods is different, something that at least brushes against what the federal government considers racial profiling. Browne, the NYPD spokesman, said the Demographic Unit does not exist. He said the department has a Zone Assessment Unit that looks for locations that could attract terrorists. But he said undercover officers only followed leads, disputing the account of several current and former police and federal officials. They do not just hang out in neighborhoods, he said. "We will go into a location, whether it's a mosque or a bookstore, if the lead warrants it, and at least establish whether there's something that requires more attention," Browne said. That conflicts with testimony from an undercover officer in the 2006 trial of Shahawar Matin Siraj, who was convicted of planning an attack on New York's subway system. The officer said he was instructed to live in Brooklyn and act as a "walking camera" for police. "I was told to act like a civilian _ hang out in the neighborhood, gather information," the Bangladeshi officer testified, under a false name, in what offered the first narrow glimpse at the NYPD's infiltration of ethnic neighborhoods. Officials said such operations just made sense. Islamic terrorists had attacked the city on 9/11, so police needed people inside the city's Muslim neighborhoods. Officials say it does not conflict with a 2004 city law prohibiting the NYPD from using religion or ethnicity "as the determinative factor for initiating law enforcement action." "It's not profiling," Cutter said. "It's like, after a shooting, do you go 20 blocks away and interview guys or do you go to the neighborhood where it happened?" In 2007, the Los Angeles Police Department was criticized for even considering a similar program. The police announced plans to map Islamic neighborhoods to look for pockets of radicalization among the region's roughly 500,000 Muslims. Criticism was swift, and chief William Bratton scrapped the plan. "A lot of these people came from countries where the police were the terrorists," Bratton said at a news conference, according to the Los Angeles Daily News. "We don't do that here. We do not want to spread fear." In New York, current and former officials said, the lesson of that controversy was that such programs should be kept secret. Some in the department, including lawyers, have privately expressed concerns about the raking program and how police use the information, current and former officials said. Part of the concern was that it might appear that police were building dossiers on innocent people, officials said. Another concern was that, if a case went to court, the department could be forced to reveal details about the program, putting the entire operation in jeopardy. That's why, former officials said, police regularly shredded documents discussing rakers. When Cohen made his case in court that he needed broader authority to investigate terrorism, he had promised to abide by the FBI's investigative guidelines. But the FBI is prohibited from using undercover agents unless there's specific evidence of criminal activity, meaning a federal raking program like the one officials described to the AP would violate FBI guidelines. The NYPD declined to make Cohen available for comment. In an earlier interview with the AP on a variety of topics, Police Commissioner Kelly said the intelligence unit does not infringe on civil rights. "We're doing what we believe we have to do to protect the city," he said. "We have many, many lawyers in our employ. We see ourselves as very conscious and aware of civil liberties. And we know there's always going to be some tension between the police department and so-called civil liberties groups because of the nature of what we do." The department clashed with civil rights groups most publicly after Cohen's undercover officers infiltrated anti-war groups before the 2004 Republican National Convention in New York. A lawsuit over that program continues today. During the convention, when protesters were arrested, police asked a list of questions which, according to court documents, included: "What are your political affiliations?" "Do you do any kind of political work?" and "Do you hate George W. Bush?" "At the end of the day, it's pure and simple a rogue domestic surveillance operation," said Christopher Dunn, a New York Civil Liberties Union lawyer involved in the convention lawsuit. Undercover agents like the rakers were valuable, but what Cohen and Sanchez wanted most were informants. The NYPD dedicated an entire squad, the Terrorist Interdiction Unit, to developing and handling informants. Current and former officials said Sanchez was instrumental in teaching them how to develop sources. For years, detectives used informants known as mosque crawlers to monitor weekly sermons and report what was said, several current and former officials directly involved in the informant program said. If FBI agents were to do that, they would be in violation of the Privacy Act, which prohibits the federal government from collecting intelligence on purely First Amendment activities. The FBI has generated its own share of controversy for putting informants inside mosques, but unlike the program described to the AP, the FBI requires evidence of a crime before an informant can be used inside a mosque. Valerie Caproni, the FBI's general counsel, would not discuss the NYPD's programs but said FBI informants can't troll mosques looking for leads. Such operations are reviewed for civil liberties concerns, she said. "If you're sending an informant into a mosque when there is no evidence of wrongdoing, that's a very high-risk thing to do," Caproni said. "You're running right up against core constitutional rights. You're talking about freedom of religion." That's why senior FBI officials in New York ordered their own agents not to accept any reports from the NYPD's mosque crawlers, two retired agents said. It's unclear whether the police department still uses mosque crawlers. Officials said that, as Muslims figured out what was going on, the mosque crawlers became cafe crawlers, fanning out into the city's ethnic hangouts. "Someone has a great imagination," Browne, the NYPD spokesman, said. "There is no such thing as mosque crawlers." Following the foiled subway plot, however, the key informant in the case, Osama Eldawoody, said he attended hundreds of prayer services and collected information even on people who showed no signs of radicalization. NYPD detectives have recruited shopkeepers and nosy neighbors to become "seeded" informants who keep police up to date on the latest happenings in ethnic neighborhoods, one official directly involved in the informant program said. The department also has a roster of "directed" informants it can tap for assignments. For instance, if a raker identifies a bookstore as a hot spot, police might assign an informant to gather information, long before there's concrete evidence of anything criminal. To identify possible informants, the department created what became known as the "debriefing program." When someone is arrested who might be useful to the intelligence unit _ whether because he said something suspicious or because he is simply a young Middle Eastern man _ he is singled out for extra questioning. Intelligence officials don't care about the underlying charges; they want to know more about his community and, ideally, they want to put him to work. Police are in prisons, too, promising better living conditions and help or money on the outside for Muslim prisoners who will work with them. Early in the intelligence division's transformation, police asked the taxi commission to run a report on all the city's Pakistani cab drivers, looking for those who got licenses fraudulently and might be susceptible to pressure to cooperate, according to former officials who were involved in or briefed on the effort. That strategy has been rejected in other cities. Boston police once asked neighboring Cambridge for a list of Somali cab drivers, Cambridge Police Chief Robert Haas said. Haas refused, saying that without a specific reason, the search was inappropriate. "It really has a chilling effect in terms of the relationship between the local police department and those cultural groups, if they think that's going to take place," Haas said. The informant division was so important to the NYPD that Cohen persuaded his former colleagues to train a detective, Steve Pinkall, at the CIA's training center at the Farm. Pinkall, who had an intelligence background as a Marine, was given an unusual temporary assignment at CIA headquarters, officials said. He took the field tradecraft course alongside future CIA spies then returned to New York to run investigations. "We found that helpful, for NYPD personnel to be exposed to the tradecraft," Browne said. The idea troubled senior FBI officials, who saw it as the NYPD and CIA blurring the lines between police work and spying, in which undercover officers regularly break the laws of foreign governments. The arrangement even made its way to FBI Director Robert Mueller, two former senior FBI officials said, but the training was already under way and Mueller did not press the issue. NYPD's intelligence operations do not stop at the city line, as the undercover operation in New Jersey made clear. The department has gotten some of its officers deputized as federal marshals, allowing them to work out of state. But often, there's no specific jurisdiction at all. Cohen's undercover squad, the Special Services Unit, operates in places such as New Jersey, Pennsylvania and Massachusetts, officials said. They can't make arrests and, if something goes wrong _ a shooting or a car accident, for instance _ the officers could be personally liable. But the NYPD has decided it's worth the risk, a former police official said. With Police Commissioner Kelly's backing, Cohen's policy is that any potential threat to New York City is the NYPD's business, regardless of where it occurs, officials said. That aggressiveness has sometimes put the NYPD at odds with local police departments and, more frequently, with the FBI. The FBI didn't like the rules Cohen played by and said his operations encroached on their responsibilities. Once, undercover officers were stopped by police in Massachusetts while conducting surveillance on a house, one former New York official recalled. In another instance, the NYPD sparked concern among federal officials by expanding its intelligence-gathering efforts related to the United Nations, where the FBI is in charge, current and former federal officials said. The AP has agreed not to disclose details of either the FBI or NYPD operations because they involve foreign counterintelligence. Both Mueller and Kelly have said their agencies have strong working relationships and said reports of rivalry and disagreements are overblown. And the NYPD's outof-state operations have had success. A young Egyptian NYPD officer living undercover in New Jersey, for example, was key to building a case against Mohamed Mahmood Alessa and Carlos Eduardo Almonte. The pair was arrested last year at John F. Kennedy Airport en route to Somalia to join the terrorist group al-Shabab. Both pleaded guilty to conspiracy. Cohen has also sent officers abroad, stationing them in 11 foreign cities. If a bomber blows himself up in Jerusalem, the NYPD rushes to the scene, said Dzikansky, who served in Israel and is the coauthor of the forthcoming book "Terrorist Suicide Bombings: Attack Interdiction, Mitigation, and Response." "I was there to ask the New York question," Dzikansky said. "Why this location? Was there something unique that the bomber had done? Was there any pre-notification. Was there a security lapse?" All of this intelligence _ from the rakers, the undercovers, the overseas liaisons and the informants _ is passed to a team of analysts hired from some of the nation's most prestigious universities. Analysts have spotted emerging trends and summarized topics such as Hezbollah's activities in New York and the threat of South Asian terrorist groups. They also have tackled more contentious topics, including drafting an analytical report on every mosque within 100 miles of New York, one former police official said. The report drew on information from mosque crawlers, undercover officers and public information. It mapped hundreds of mosques and discussed the likelihood of them being infiltrated by al-Qaida, Hezbollah and other terrorist groups. For Cohen, there was only one way to measure success: "They haven't attacked us," he said in a 2005 deposition. He said anything that was bad for terrorists was good for NYPD. Though the CIA is prohibited from collecting intelligence domestically, the wall between domestic and foreign operations became more porous. Intelligence gathered by the NYPD, with CIA officer Sanchez overseeing collection, was often passed to the CIA in informal conversations and through unofficial channels, a former official involved in that process said. By design, the NYPD was looking more and more like a domestic CIA. "It's like starting the CIA over in the post-9/11 world," Cohen said in "Protecting the City," a laudatory 2009 book about the NYPD. "What would you do if you could begin it all over again? Hah. This is what you would do." Sanchez's assignment in New York ended in 2004, but he received permission to take a leave of absence from the agency and become Cohen's deputy, former officials said. Though Sanchez's assignments were blessed by CIA management, some in the agency's New York station saw the presence of such a senior officer in the city as a turf encroachment. Finally, the New York station chief, Tom Higgins, called headquarters, one former senior intelligence official said. Higgins complained, the official said, that Sanchez was wearing both hats, sometimes acting as a CIA officer, sometimes as an NYPD official. The CIA finally forced him to choose: Stay with the agency or stay with the NYPD. Sanchez declined to comment to the AP about the arrangement, but he picked the NYPD. He retired last year and is now a consultant in the Middle East. Last month, the CIA deepened its NYPD ties even further. It sent one of its most experienced operatives, a former station chief in two Middle Eastern countries, to work out of police headquarters as Cohen's special assistant while on the CIA payroll. Current and former U.S. officials acknowledge it's unusual but said it's the kind of collaboration Americans expect after 9/11. Officials said revealing the CIA officer's name would jeopardize national security. The arrangement was described as a sabbatical. He is a member of the agency's senior management, but officials said he was sent to the municipal police department to get management experience. At the NYPD, he works undercover in the senior ranks of the intelligence division. Officials are adamant that he is not involved in actual intelligence-gathering. The NYPD has faced little scrutiny over the past decade as it has taken on broad new intelligence missions, targeted ethnic neighborhoods and partnered with the CIA in extraordinary ways. The department's primary watchdog, the New York City Council, has not held hearings on the intelligence division's operations and former NYPD officials said council members typically do not ask for details. "Ray Kelly briefs me privately on certain subjects that should not be discussed in public," said City Councilman Peter Vallone. "We've discussed in person how they investigate certain groups they suspect have terrorist sympathizers or have terrorist suspects." The city comptroller's office has audited several NYPD components since 9/11 but not the intelligence unit, which had a $62 million budget last year. The federal government, too, has done little to scrutinize the nation's largest police force, despite the massive federal aid. Homeland Security officials review NYPD grants but not its underlying programs. A report in January by the Homeland Security inspector general, for instance, found that the NYPD violated state and federal contracting rules between 2006 and 2008 by buying more than $4 million in equipment through a no-bid process. NYPD said public bidding would have revealed sensitive information to terrorists, but police never got approval from state or federal officials to adopt their own rules, the inspector general said. On Capitol Hill, where FBI tactics have frequently been criticized for their effect on civil liberties, the NYPD faces no such opposition. In 2007, Sanchez testified before the Senate Homeland Security Committee and was asked how the NYPD spots signs of radicalization. He said the key was viewing innocuous activity, including behavior that might be protected by the First Amendment, as a potential precursor to terrorism. That triggered no questions from the committee, which Sanchez said had been "briefed in the past on how we do business." The Justice Department has the authority to investigate civil rights violations. It issued detailed rules in 2003 against racial profiling, including prohibiting agencies from considering race when making traffic stops or assigning patrols. But those rules apply only to the federal government and contain a murky exemption for terrorism investigations. The Justice Department has not investigated a police department for civil rights violations during a national security investigation. "One of the hallmarks of the intelligence division over the last 10 years is that, not only has it gotten extremely aggressive and sophisticated, but it's operating completely on its own," said Dunn, the civil liberties lawyer. "There are no checks. There is no oversight." The NYPD has been mentioned as a model for policing in the post-9/11 era. But it's a model that seems custom-made for New York. No other city has the Big Apple's combination of a low crime rate, a $4.5 billion police budget and a diverse 34,000-person police force. Certainly no other police department has such deep CIA ties. Perhaps most important, nobody else had 9/11 the way New York did. No other city lost nearly 3,000 people in a single morning. A decade later, police say New Yorkers still expect the department to do whatever it can to prevent another attack. The NYPD has embraced that expectation. As Sanchez testified on Capitol Hill: "We've been given the public tolerance and the luxury to be very aggressive on this topic." Since 9/11 Muslims have been unlawfully targeted. NYPD proves CCR ‘14 The center for constitutional rights is a website that reports on social injustices such as the unjust surveillance of people based on their race, ethnicity or religion. March 6th 2014 https://ccrjustice.org/home/get-involved/tools-resources/fact-sheets-and-faqs/nypd-ssurveillance-and-targeting-muslims-new July 7th 2015 Since 9/11, (actual or perceived) Muslims, Arabs and South Asians have been viewed by law enforcement as a potential threat on no basis other than religion, casting guilt on all members of that faith. The New York City Police Department (NYPD) has developed a sweeping and secretive human surveillance program that targets Muslims and members of the Arab and South Asian communities in New York City, New Jersey, and elsewhere – solely on the basis of their religious affiliation. This massive mapping and surveillance program has been used to monitor the lives of Muslims, their businesses, houses of worship, organizations and schools – despite any basis for belief of criminal activity. The methods the NYPD uses in their surveillance program are extremely invasive and places targeted make little sense CCR ‘14 The center for constitutional rights is a website that reports on social injustices such as the unjust surveillance of people based on their race, ethnicity or religion. March 6th 2014 https://ccrjustice.org/home/get-involved/tools-resources/fact-sheets-and-faqs/nypd-ssurveillance-and-targeting-muslims-new July 7th 2015 As part of the surveillance program, NYPD officers have snapped pictures, taken video, and mounted cameras aimed at mosques for the purpose of round-the-clock surveillance in order to help identify worshippers. The NYPD has also employed “Mosque crawlers” are undercover officers who monitor sermons and conversations in mosques and report back to the NYPD. As a result, thousands of prayer services in mosques have been monitored and documented. The NYPD also uses undercover officers called “rakers” to monitor daily life in neighborhoods and locations they believe to be heavily Muslim – including bookstores, bars, businesses, cafes, delis, restaurants and nightclubs. Officers have taken note of flyers offering Qur’an classes and which delis that offer halal meat. One woman was surveilled because she operates a gradeschool for Muslim girls. The only effect of the surveillance the NYPD has conducted is harming the Muslim American Community, no criminal leads have been produced CCR ‘14 The center for constitutional rights is a website that reports on social injustices such as the unjust surveillance of people based on their race, ethnicity or religion. March 6th 2014 https://ccrjustice.org/home/get-involved/tools-resources/fact-sheets-and-faqs/nypd-ssurveillance-and-targeting-muslims-new July 7th 2015 The NYPD’s surveillance program has had a chilling effect on Muslim American communities, particularly in New Jersey and New York City. By suggesting that Muslims pose a special threat to public safety and treating them with suspicion as such, the program has led to the alteration and reduction of religious practices, decreased mosque attendance, and loss of business—not to mention a widespread sense of fear, distrust, and alienation. Furthermore, in ten years, this surveillance program has not produced any leads to criminal activity. Instead, by targeting Muslims based on their beliefs and affiliations rather than their actions, the NYPD has equated Islam with predisposition to criminality. - This surveillance is not only discriminatory but unconstitutional CCR ‘14 The center for constitutional rights is a website that reports on social injustices such as the unjust surveillance of people based on their race, ethnicity or religion. March 6th 2014 https://ccrjustice.org/home/get-involved/tools-resources/fact-sheets-and-faqs/nypd-ssurveillance-and-targeting-muslims-new July 7th 2015 The targeting of Muslim communities in New Jersey by the NYPD must be contextualized as another facet of the Department’s use of discriminatory policing practices – that is, when law enforcement targets communities for enforcement activities not on the basis of what they have done, but who they are. This is not only unjust, it is also unconstitutional. The FBI pushed vulnerable Muslims to commit acts of terror for sting operations CAIR 14 (The Council on American-Islamic Relations (CAIR) is a grassroots civil rights and advocacy group and CAIR America's largest Muslim civil liberties organization, with regional offices nationwide, Pub. 7/22/14, “HRW Report: FBI encourage, paid Muslims to plot attacks”, http://www.cair.com/press-center/american-muslim-news/12571-hrw-report-fbi-encouragedpaid-muslims-to-plot-attacks.html, Access 7/7/15) The FBI encouraged and sometimes even paid Muslims to commit terrorist acts during numerous sting operations after the 9/11 attacks, a human rights group said in a report published Monday. "Far from protecting Americans, including American Muslims, from the threat of terrorism, the policies documented in this report have diverted law enforcement from pursuing real threats," said the report by Human Rights Watch. Aided by Columbia University Law School's Human Rights Institute, Human Rights Watch examined 27 cases from investigation through trial, interviewing 215 people, including those charged or convicted in terrorism cases, their relatives, defense lawyers, prosecutors and judges. "In some cases the FBI may have created terrorists out of law-abiding individuals by suggesting the idea of taking terrorist action or encouraging the target to act," the report said. In the cases reviewed, half the convictions resulted from a sting operation, and in 30 percent of those cases the undercover agent played an active role in the plot. "Americans have been told that their government is keeping them safe by preventing and prosecuting terrorism inside the US," said Andrea Prasow, the rights group's deputy Washington director. "But take a closer look and you realise that many of these people would never have committed a crime if not for law enforcement encouraging, pressuring and sometimes paying them to commit terrorist acts." The report cites the case of four Muslim converts from Newburgh, New York who were accused of planning to blow up synagogues and attack a US military base. A judge in that case "said the government 'came up with the crime, provided the means, and removed all relevant obstacles,' and had, in the process, made a terrorist out of a man 'whose buffoonery is positively Shakespearean in scope,'" the report said. The rights group charged that the FBI often targets vulnerable people, with mental problems or low intelligence. It pointed to the case of Rezwan Ferdaus, who was sentenced to 17 years in prison at age 27 for wanting to attack the Pentagon and Congress with mini-drones loaded with explosives. An FBI agent told Ferdaus' father that his son "obviously" had mental health problems, the report said. But that didn't stop an undercover agent from conceiving the plot in its entirety, it said. "The US government should stop treating American Muslims as terrorists-inwaiting," the report concluded. Insert Tag Phelps ’13 (Paulina, Author at the Seattle Globalist, Georgetown media group, Africa.redux media, and Saratoga wire, “Arab and Muslim communities react to NSA surveillance leak,” June/25, Seattle Globalist, http://seattleglobalist.com/2013/06/25/araband-muslim-nsa-surveillance-leak/14225,LS) So the government’s been spying on us? Arab and Muslim activists in Seattle say they aren’t surprised. When news broke earlier this month of the NSA’s vast, intrusive surveillance programs, U.S. citizens had the uncomfortable experience of suddenly feeling like suspects. Even for the majority of Americans who say they approve of the program, it was hard not to rack your brain for things you had said in a phone call or email that might have caught the government’s attention. But that feeling was nothing new for Arabs, Muslims, South Asians and other groups who have been subject to surveillance and prejudice since 9/11. President Obama responded to the leak with assurances that “nobody is listening to your telephone calls.” Instead, he said, the surveillance only takes place when “they may identify potential leads with respect to people that might engage in terrorism.” Devon Abdallah, secretary of the Arab American Community Coalition (AACC), based here in Seattle, says that the kind of “reasonable suspicion” used to justify NSA surveillance often amounts to little more than racial profiling. “The reality is, in our society there is so much institutional racism and subconscious stereotyping that people naturally are going to just pay more attention to someone with an Arab name,” Abdallah said. “I’ve seen the people they’ve deported that they’ve seen as ‘terrorists’ and I can guarantee you that they aren’t.” Damon Shadid, a Lebanese-American attorney who also works with the AACC believes that if people knew the extent of the personal information that has been collected, they wouldn’t be as supportive of the program. “The thing that disturbs me most…is this poll that is being cited all over the Internet that is saying 60% of Americans are okay with [the surveillance system]… the poll does not ask the right questions.” Shadid said. “If they asked the question ‘are you okay with your text messages being read,’ or ‘are you okay with the subject line of your email being read by the government’ the public would have a completely different response.” “As a Lebanese-American who deals with international clients, all the sudden my metadata may be looked at closer. [That] could create suspicion on me where none should exist,” Shadid said. “And that goes for every Arab and Muslim in the community.” “Suspicionless surveillance does not become okay simply because it’s only victimizing 95 percent of the world instead of 100 percent,” whistleblower Edward Snowden said in an online Q & A hosted by the Guardian last week, referring to assurances that only communications outside the US are being monitored. “Our founders did not write, ‘we hold these Truths to be self-evident, that all US Persons are created equal.’” Arsalan Bukhari, executive director of the Council on American-Islamic Relations (CAIR) Washington Chapter, agrees that the system is unconstitutional. But he’s more optimistic about the ultimate outcome of the leak. “I hope the good that comes out of this are clear guidelines that regulate when and how the government can survey a person.” he said. “For too long we’ve had unconstitutional surveillance. We want to make sure the constitution is the law of the land and is followed — which means you have to get a warrant.” Egyptian-American Muslim activist Tarek Dawoud compared the government’s actions to that of other countries. “This is what is happening in Egypt… it’s not a good sign you can see this country going down that path and it’s a concern because one of the greatest gifts people have here is to be free and the ability to challenge authority.” Ultimately all of these voices on the issue, including the person behind the leak, echo feelings of betrayal by the government. And they seem to agree that the existing system is unconstitutional and vulnerable to racial profiling. Arabs, Muslims, and South Asians have been experiencing government surveillance as a “national security measure” ever since 9/11. So for the entire country to suddenly realize they may be subject to the same thing is almost a relief. Insert Tag Kayyali ’06 (Randa, course instructor at George Mason University, Director of Finance and Administration at the Safe Energy communication Council, Excutive Director for the Association of Arab-American University Graduates, Director of Public Relations/Office Manager at the American Educational Trust, Writer at the American Anti-Discrimination Committee, and Presidential Intern at the American University in Cairo, anti-discrimination advocate , “The People Perceived as a Threat to Security: Arab Americans Since September 11,” 7/1, Migration Policy Institute, http://www.migrationpolicy.org/article/people-perceivedthreat-security-arab-americans-september-11,LS) Since the terrorist acts of September 11, 2001, Arab Americans have regularly been featured in the press as a group "of interest" to many federal agencies, particularly the Federal Bureau of Investigation (FBI). Yet government security agencies have recruited them for their language skills — the FBI has hired 195 Arabic linguists since 9/11 although other agencies, such as the Central Intelligence Agency (CIA), have not released the number of new hires. Despite demand, the number of recruits is low due to bureaucratic problems and the difficulties Arab Americans face in getting top-level security clearances. Similar to other U.S. immigrant groups in the past, they are viewed as suspect simply because of their origin. Although the term "Arab American" is often used, it remains misunderstood. Who exactly is an Arab American? Are all Arab Americans Muslim? Has the immigration rate of Arab Americans decreased as a result of 9/11? What has been the net fall-out effect of 9/11 on this group? This article will provide definitions, look at flow data from recent years, and examine the trend of immigration and security policies affecting Arab Americans. Definitions Arab Americans are the immigrants (and their descendents) from the Arabic-speaking countries of the Middle East and North Africa. Under this classification, Arabic-speaking countries include the members of the Arab League and range from Morocco in the west to Iraq in the east (see sidebar). Individuals from Iran and Turkey, where the predominant languages are Farsi and Turkish, respectively, are not considered to be of Arab origin even though these countries are part of the Middle East. According to the U.S. Census Bureau, Arab Americans are those who responded to the 2000 census question about ancestry by listing a predominantly Arabic-speaking country or part of the world as their place of origin. The main Arab-speaking countries cited in the 2000 census included Egypt, Iraq, Jordan, Lebanon, Morocco, Palestine, and Syria. Although some people from Arabic-speaking countries identify themselves as Arab, many do not but are regularly defined as such in the United States by the government and the average American, adding further weight to the term. Because some choose a national identity, such as Lebanese or Egyptian, over the term Arab, the diversity of the community must be recognized at the outset of any discussion about Arab Americans. In truth, there are hot debates about whether there is one or many communities of Arab Americans because of the distance, both physical and emotional, between various groups. In regards to religious affiliation among Arab Americans, surprisingly few studies have been done. However, the Arab American Institute, based on a 2002 Zogby International poll, estimates that 63 percent of Arab Americans are Christian, 24 percent are Muslim, and 13 percent belong to another religion or have no religious affiliation. The Muslim Arab-American population includes Sunni, Shi'a, and Druze. Among the Christians, 35 percent are Catholics (Maronites, Melkites, and Eastern Rite Catholics), 18 percent are Eastern Orthodox (Antiochian, Syrian, Greek, and Coptic Christians), and 10 percent are Protestant. The high proportion of Christians among Arab Americans is partially due to the descendants of Arab immigrants who arrived in the late 19th and early 20th centuries; they mostly came from Mount Lebanon, an area inhabited by Maronite Christians and Druze that is now in Lebanon. Also, minority groups — Maronites and Orthodox Christians from Lebanon, Coptic Christians from Egypt, Shia' Muslims and Chaldeans from Iraq, and Orthodox Christians from Palestine — are immigrating to the United States today in larger numbers than the majority Sunni Muslim population of the Middle East. How Arab Americans Are Counted Unlike Asian, white, or black, "Arab" is not a racial category for the Census Bureau. Rather, Arab Americans are considered white, defined by the Census Bureau as "a person having origins in any of the original peoples of Europe, the Middle East, or North Africa." This distinction dates back to court decisions from 1913 to 1917 on the "whiteness" of Syrian and Palestinian immigrants. Arab Americans who received only the short form of the 2000 census, which is sent to all U.S. households, could check the "white" box for race; if they self-identified as "other" and then identified themselves on the long form as a person from the Middle East or North Africa, the Census Bureau reassigned them to the "white" category. This classification system is in line with other federal guidelines on race and ethnic standards, as set out by Directive 15 by the Office of Management and Budget, and therefore is present in many administrative forms. Since the 2000 census, the Census Bureau has published two reports on Arab Americans, both of which are based on the long form that asks about ancestry and is sent to only one-sixth of all U.S. households. The first report, issued in 2003, reported that about 1.2 million people in the United States reported Arab ancestry alone or in combination with another ancestry. The second report, issued in 2005, focused on the 850,000 people who reported at least one Arab ancestry and no non-Arab ancestries (see Table 1 and Figure 1). Therefore, a person of British-Egyptian heritage would have been included in the first report and excluded from the second. In both reports, the Census Bureau differs from the Arab League membership definition in that it excludes those from Mauritania, Somalia, Djibouti, Sudan, and the Comoros — countries that are members of the Arab League and include large Arabic-speaking populations. Arab-American organizations estimate that the Census Bureau counted only one of every three Arab Americans in 2000, and therefore these organizations estimate the number at approximately 3.5 million, or 1.2 percent of the total U.S. population. This 3.5 million estimate of Arab Americans in 2000 also includes those of mixed Arab and non-Arab heritage, unlike the 2005 Census report. Another way to examine the Arab-American population is to look at the foreign-born population from Arab countries. Although the media portray the Arab-American population as wholly foreign born, the 2005 census report found that only about 50 percent of Arabs in the United States were foreign born; of these, about half were naturalized U.S. citizens and the other half were not citizens. Therefore, half of the Arab Americans in 2005 report were either born in the United States or born abroad to U.S.-citizen parents. Of the foreign born, 46 percent arrived between 1990 and 2000, compared to 42 percent of the total foreign-born population. Immigrant and Nonimmigrant Flows Since 9/11 Many assume that the immigration of Arabs to the United States decreased after 9/11. However, the numbers of those admitted as immigrants or those who became legal permanent residents from Arabic-speaking countries has remained level at around four percent of the total number of foreign nationals admitted as immigrants to the United States, even though there was a drop in 2003. In 2005, over 4,000 nationals from Egypt, Iraq, Lebanon, Morocco, Somalia, and Sudan, in addition to an unknown number of Palestinians, became permanent residents (see Table 2). What has dropped drastically post-9/11 is the number of nonimmigrants who are issued visas and admitted to the United States as tourists, students, or temporary workers. The largest numerical drop between 2000 and 2004 (70 percent) has been in the number of tourist and business visas issued to individuals from Gulf countries, which include Kuwait, Saudi Arabia, Bahrain, Qatar, United Arab Emirates, and Oman. Although there was a decrease in the number of all incoming foreign students between 2001 and 2004, the number of student visas issued to individuals from Arabic-speaking countries dropped substantially. The greatest numerical drop, from 19,696 student visas in 2000 to 6,826 in 2004 (65.3 percent), came from the Gulf countries. The number of Egyptians who entered on student visas dropped 52.7 percent between 2000 and 2004 (see Table 3). One of the first reasons cited for the decrease in the number of foreign students was increased security measures, particularly the Patriot Act and its provision that required the implementation of the Student and Exchange Visitor Information System (SEVIS). SEVIS is an online database that monitors international student compliance with immigration laws by requiring all schools to be certified and to regularly update information on each foreign student, including their visa type, status as a student (full-time enrollment is required), biographical information, class registration, and current address. Recent reports by the Government Accountability Office (GAO) and the Institute of International Education (IIE) found that the decline in the number of international students is not due to SEVIS but, according to IIE, to "real and perceived difficulties in obtaining students visas (especially in scientific and technical fields), rising U.S. tuition costs, vigorous recruitment activities by other English-speaking nations, and perceptions abroad that it is more difficult for international students to come to the United States." Increasing global competition for the best students has added to the drop in the numbers of international students. While these reasons may be the most significant deterrents for all international students, such observations do not adequately answer why the number of Arab students has been disproportionately reduced. The numbers of visitors for business and pleasure has similarly decreased. Businessmen and tourists from the Gulf went from 84,778 in 2000 to 25,005 in 2004, a 70.5 percent decrease. The number of Egyptian visitors dropped 51.5 percent, from 48,904 in 2000 to 23,742 in 2004. The decrease in the number of both visitors and students from Morocco, Jordan, and Lebanon was also significant but lower than that of Egypt and the Gulf states. The causes for these declines have not been investigated although some researchers cite visa delays and fears of discrimination. Security-Related Policy and Arab Americans Another consequence of 9/11 has been the increased monitoring of Arab and Muslim Americans for security reasons. Although most FBI interviews of Arab and/or Muslim Americans have been conducted voluntarily, the increased attention has caused tension, nervousness, and concern to many individuals, as well as community leaders and organizations. A two-year study conducted by the Vera Institute of Justice and funded by the National Institute of Justice, a research agency of the U.S. Department of Justice, confirmed that 9/11 had a substantial impact on Arab Americans and their perceptions of federal agencies, particularly the FBI. The report states, "Although community members also reported increases in hate victimization, they expressed greater concern about being victimized by federal policies and practices than by individual acts of harassment or violence." A major issue of concern remains the 2001 Patriot Act and its provisions that allow increased surveillance without approved court orders. The number of people who have been charged or convicted for terrorism under the act is unclear. In June 2005, President Bush stated that over 400 charges were made as a result of terrorism investigations, but in almost all of these cases, the federal prosecutors chose to charge the plaintiffs with nonterror charges, such as immigration violations. Under the Patriot Act, anyone asked for information about an individual or group of people by the FBI has a gag order placed on them, regardless of whether the identity of the individual becomes public knowledge. In December 2005, President Bush confirmed that he authorized warrantless searches in which the National Security Agency (NSA) monitored phone calls and emails from possibly thousands of citizens and others in the United States who contacted persons abroad. Despite the former NSA director’s reassurances that the program was targeted and focused on persons associated with Al Qaeda, Arab Americans are concerned about the legality of warrantless searches, and the program has increased feelings of being targeted and put under surveillance due to their ethnic background and contact with friends and family in the Middle East. In 2006, several organizations filed lawsuits challenging the legality of warrantless domestic spying as well as the release of thousands of customer phone records by BellSouth, AT&T, and Verizon, citing violation of privacy. In addition, in 2003, the Department of Homeland Security implemented the National Security Entry/Exit Registration System (NSEERS), which required males over the age of 16 from certain countries who had entered the United States since October 2002 to report to immigration offices to be photographed and fingerprinted on an annual basis. Shortly after NSEERS was implemented, immigration authorities fingerprinted, photographed, and questioned 80,000 men. It is not known how many individuals were Arab, but 19 out of the 25 countries on the NSEERS list were Arabicspeaking. Although the main features of this program were suspended in December 2003, nationals of some countries — Iraq, Iran, Libya, Sudan, and Syria — are still bound by the NSEERS requirements. As a result of NSEERS and other initiatives, the number of deportations from the Arab countries on the NSEERS list and an additional five predominantly Muslim countries also on the list increased 31.4 percent in the two-year period following 9/11. The percentile rise in deportation orders for nationals of other countries was 3.4 percent in comparison. Human rights, civil liberties, and Arab-American organizations believe these facts point to a trend of profiling and patterns of selective enforcement of immigration laws. Together, these security and immigration measures have given the impression that the U.S. government believes Arabs and Muslims to be a suspicious and dangerous group to whom constitutional rights and liberties do not apply. Looking Ahead One of the long-term consequences of 9/11 was a questioning of identity and the outward expression of ethnicity and religion. In the last five years, many Arab Americans have asked themselves, How do I present myself when the mention of my ethnicity and/or religion is enough to make others uncomfortable? While some have decided to hide their heritage or privilege another ethnic background — also the reaction of some German Americans after World War I and Japanese Americans after World War II — others have channeled this dilemma into artistic expression. As a result, Arab-American arts have blossomed. Fiction and poetry — particularly by Arab-American women — art exhibits, and comedy acts have found their way into the public domain, giving Arab Americans a more human face. However, heightened security fears and recent terrorist attacks in Europe have kept the Arab American community under the microscope of the FBI and NSA. The perception of surveillance that dominates many local and national-level discussions between Arab Americans and these agencies is not likely to decrease unless pending lawsuits result in the courts finding the warrantless searches or the release of phone records to be unconstitutional and a violation of due process or privacy. While the flow of immigrants has remained slow but steady, the number of students and visitors has slowed down substantially. Although these decreases are unlikely to isolate Arab Americans from their friends and family in the Middle East and North Africa, it may indicate a decrease in the interactions between people who are Arab and live in the Middle East and Americans who live in the United States. In the current political climate, it seems there is a growing need for cultural exchanges — yet the opportunities for those very cultural exchanges are declining. The Arab American Identity Phelps ’13 (Paulina, Author at the Seattle Globalist, Georgetown media group, Africa.redux media, and Saratoga wire, “Arab and Muslim communities react to NSA surveillance leak,” June/25, Seattle Globalist, http://seattleglobalist.com/2013/06/25/araband-muslim-nsa-surveillance-leak/14225,LS) Since the terrorist acts of September 11, 2001, Arab Americans have regularly been featured in the press as a group "of interest" to many federal agencies, particularly the Federal Bureau of Investigation (FBI). Yet government security agencies have recruited them for their language skills — the FBI has hired 195 Arabic linguists since 9/11 although other agencies, such as the Central Intelligence Agency (CIA), have not released the number of new hires. Despite demand, the number of recruits is low due to bureaucratic problems and the difficulties Arab Americans face in getting top-level security clearances. Similar to other U.S. immigrant groups in the past, they are viewed as suspect simply because of their origin. Although the term "Arab American" is often used, it remains misunderstood. Who exactly is an Arab American? Are all Arab Americans Muslim? Has the immigration rate of Arab Americans decreased as a result of 9/11? What has been the net fall-out effect of 9/11 on this group? This article will provide definitions, look at flow data from recent years, and examine the trend of immigration and security policies affecting Arab Americans. Definitions Arab Americans are the immigrants (and their descendents) from the Arabic-speaking countries of the Middle East and North Africa. Under this classification, Arabic-speaking countries include the members of the Arab League and range from Morocco in the west to Iraq in the east (see sidebar). Individuals from Iran and Turkey, where the predominant languages are Farsi and Turkish, respectively, are not considered to be of Arab origin even though these countries are part of the Middle East. According to the U.S. Census Bureau, Arab Americans are those who responded to the 2000 census question about ancestry by listing a predominantly Arabic-speaking country or part of the world as their place of origin. The main Arab-speaking countries cited in the 2000 census included Egypt, Iraq, Jordan, Lebanon, Morocco, Palestine, and Syria. Although some people from Arabic-speaking countries identify themselves as Arab, many do not but are regularly defined as such in the United States by the government and the average American, adding further weight to the term. Because some choose a national identity, such as Lebanese or Egyptian, over the term Arab, the diversity of the community must be recognized at the outset of any discussion about Arab Americans. In truth, there are hot debates about whether there is one or many communities of Arab Americans because of the distance, both physical and emotional, between various groups. In regards to religious affiliation among Arab Americans, surprisingly few studies have been done. However, the Arab American Institute, based on a 2002 Zogby International poll, estimates that 63 percent of Arab Americans are Christian, 24 percent are Muslim, and 13 percent belong to another religion or have no religious affiliation. The Muslim Arab-American population includes Sunni, Shi'a, and Druze. Among the Christians, 35 percent are Catholics (Maronites, Melkites, and Eastern Rite Catholics), 18 percent are Eastern Orthodox (Antiochian, Syrian, Greek, and Coptic Christians), and 10 percent are Protestant. The high proportion of Christians among Arab Americans is partially due to the descendants of Arab immigrants who arrived in the late 19th and early 20th centuries; they mostly came from Mount Lebanon, an area inhabited by Maronite Christians and Druze that is now in Lebanon. Also, minority groups — Maronites and Orthodox Christians from Lebanon, Coptic Christians from Egypt, Shia' Muslims and Chaldeans from Iraq, and Orthodox Christians from Palestine — are immigrating to the United States today in larger numbers than the majority Sunni Muslim population of the Middle East. How Arab Americans Are Counted Unlike Asian, white, or black, "Arab" is not a racial category for the Census Bureau. Rather, Arab Americans are considered white, defined by the Census Bureau as "a person having origins in any of the original peoples of Europe, the Middle East, or North Africa." This distinction dates back to court decisions from 1913 to 1917 on the "whiteness" of Syrian and Palestinian immigrants. Arab Americans who received only the short form of the 2000 census, which is sent to all U.S. households, could check the "white" box for race; if they self-identified as "other" and then identified themselves on the long form as a person from the Middle East or North Africa, the Census Bureau reassigned them to the "white" category. This classification system is in line with other federal guidelines on race and ethnic standards, as set out by Directive 15 by the Office of Management and Budget, and therefore is present in many administrative forms. Since the 2000 census, the Census Bureau has published two reports on Arab Americans, both of which are based on the long form that asks about ancestry and is sent to only one-sixth of all U.S. households. The first report, issued in 2003, reported that about 1.2 million people in the United States reported Arab ancestry alone or in combination with another ancestry. The second report, issued in 2005, focused on the 850,000 people who reported at least one Arab ancestry and no non-Arab ancestries (see Table 1 and Figure 1). Therefore, a person of British-Egyptian heritage would have been included in the first report and excluded from the second. In both reports, the Census Bureau differs from the Arab League membership definition in that it excludes those from Mauritania, Somalia, Djibouti, Sudan, and the Comoros — countries that are members of the Arab League and include large Arabic-speaking populations. Arab-American organizations estimate that the Census Bureau counted only one of every three Arab Americans in 2000, and therefore these organizations estimate the number at approximately 3.5 million, or 1.2 percent of the total U.S. population. This 3.5 million estimate of Arab Americans in 2000 also includes those of mixed Arab and non-Arab heritage, unlike the 2005 Census report. Another way to examine the Arab-American population is to look at the foreign-born population from Arab countries. Although the media portray the Arab-American population as wholly foreign born, the 2005 census report found that only about 50 percent of Arabs in the United States were foreign born; of these, about half were naturalized U.S. citizens and the other half were not citizens. Therefore, half of the Arab Americans in 2005 report were either born in the United States or born abroad to U.S.-citizen parents. Of the foreign born, 46 percent arrived between 1990 and 2000, compared to 42 percent of the total foreign-born population. Immigrant and Nonimmigrant Flows Since 9/11 Many assume that the immigration of Arabs to the United States decreased after 9/11. However, the numbers of those admitted as immigrants or those who became legal permanent residents from Arabic-speaking countries has remained level at around four percent of the total number of foreign nationals admitted as immigrants to the United States, even though there was a drop in 2003. In 2005, over 4,000 nationals from Egypt, Iraq, Lebanon, Morocco, Somalia, and Sudan, in addition to an unknown number of Palestinians, became permanent residents (see Table 2). What has dropped drastically post-9/11 is the number of nonimmigrants who are issued visas and admitted to the United States as tourists, students, or temporary workers. The largest numerical drop between 2000 and 2004 (70 percent) has been in the number of tourist and business visas issued to individuals from Gulf countries, which include Kuwait, Saudi Arabia, Bahrain, Qatar, United Arab Emirates, and Oman. Although there was a decrease in the number of all incoming foreign students between 2001 and 2004, the number of student visas issued to individuals from Arabic-speaking countries dropped substantially. The greatest numerical drop, from 19,696 student visas in 2000 to 6,826 in 2004 (65.3 percent), came from the Gulf countries. The number of Egyptians who entered on student visas dropped 52.7 percent between 2000 and 2004 (see Table 3). One of the first reasons cited for the decrease in the number of foreign students was increased security measures, particularly the Patriot Act and its provision that required the implementation of the Student and Exchange Visitor Information System (SEVIS). SEVIS is an online database that monitors international student compliance with immigration laws by requiring all schools to be certified and to regularly update information on each foreign student, including their visa type, status as a student (full-time enrollment is required), biographical information, class registration, and current address. Recent reports by the Government Accountability Office (GAO) and the Institute of International Education (IIE) found that the decline in the number of international students is not due to SEVIS but, according to IIE, to "real and perceived difficulties in obtaining students visas (especially in scientific and technical fields), rising U.S. tuition costs, vigorous recruitment activities by other English-speaking nations, and perceptions abroad that it is more difficult for international students to come to the United States." Increasing global competition for the best students has added to the drop in the numbers of international students. While these reasons may be the most significant deterrents for all international students, such observations do not adequately answer why the number of Arab students has been disproportionately reduced. The numbers of visitors for business and pleasure has similarly decreased. Businessmen and tourists from the Gulf went from 84,778 in 2000 to 25,005 in 2004, a 70.5 percent decrease. The number of Egyptian visitors dropped 51.5 percent, from 48,904 in 2000 to 23,742 in 2004. The decrease in the number of both visitors and students from Morocco, Jordan, and Lebanon was also significant but lower than that of Egypt and the Gulf states. The causes for these declines have not been investigated although some researchers cite visa delays and fears of discrimination. Security-Related Policy and Arab Americans Another consequence of 9/11 has been the increased monitoring of Arab and Muslim Americans for security reasons. Although most FBI interviews of Arab and/or Muslim Americans have been conducted voluntarily, the increased attention has caused tension, nervousness, and concern to many individuals, as well as community leaders and organizations. A two-year study conducted by the Vera Institute of Justice and funded by the National Institute of Justice, a research agency of the U.S. Department of Justice, confirmed that 9/11 had a substantial impact on Arab Americans and their perceptions of federal agencies, particularly the FBI. The report states, "Although community members also reported increases in hate victimization, they expressed greater concern about being victimized by federal policies and practices than by individual acts of harassment or violence." A major issue of concern remains the 2001 Patriot Act and its provisions that allow increased surveillance without approved court orders. The number of people who have been charged or convicted for terrorism under the act is unclear. In June 2005, President Bush stated that over 400 charges were made as a result of terrorism investigations, but in almost all of these cases, the federal prosecutors chose to charge the plaintiffs with nonterror charges, such as immigration violations. Under the Patriot Act, anyone asked for information about an individual or group of people by the FBI has a gag order placed on them, regardless of whether the identity of the individual becomes public knowledge. In December 2005, President Bush confirmed that he authorized warrantless searches in which the National Security Agency (NSA) monitored phone calls and emails from possibly thousands of citizens and others in the United States who contacted persons abroad. Despite the former NSA director’s reassurances that the program was targeted and focused on persons associated with Al Qaeda, Arab Americans are concerned about the legality of warrantless searches, and the program has increased feelings of being targeted and put under surveillance due to their ethnic background and contact with friends and family in the Middle East. In 2006, several organizations filed lawsuits challenging the legality of warrantless domestic spying as well as the release of thousands of customer phone records by BellSouth, AT&T, and Verizon, citing violation of privacy. In addition, in 2003, the Department of Homeland Security implemented the National Security Entry/Exit Registration System (NSEERS), which required males over the age of 16 from certain countries who had entered the United States since October 2002 to report to immigration offices to be photographed and fingerprinted on an annual basis. Shortly after NSEERS was implemented, immigration authorities fingerprinted, photographed, and questioned 80,000 men. It is not known how many individuals were Arab, but 19 out of the 25 countries on the NSEERS list were Arabic-speaking. Although the main features of this program were suspended in December 2003, nationals of some countries — Iraq, Iran, Libya, Sudan, and Syria — are still bound by the NSEERS requirements. As a result of NSEERS and other initiatives, the number of deportations from the Arab countries on the NSEERS list and an additional five predominantly Muslim countries also on the list increased 31.4 percent in the two-year period following 9/11. The percentile rise in deportation orders for nationals of other countries was 3.4 percent in comparison. Human rights, civil liberties, and Arab-American organizations believe these facts point to a trend of profiling and patterns of selective enforcement of immigration laws. Together, these security and immigration measures have given the impression that the U.S. government believes Arabs and Muslims to be a suspicious and dangerous group to whom constitutional rights and liberties do not apply. Targeted surveillance hurts the Arab American Identity Phelps ’13 (Paulina, Author at the Seattle Globalist, Georgetown media group, Africa.redux media, and Saratoga wire, “Arab and Muslim communities react to NSA surveillance leak,” June/25, Seattle Globalist, http://seattleglobalist.com/2013/06/25/araband-muslim-nsa-surveillance-leak/14225,LS) Since the terrorist acts of September 11, 2001, Arab Americans have regularly been featured in the press as a group "of interest" to many federal agencies, particularly the Federal Bureau of Investigation (FBI). Yet government security agencies have recruited them for their language skills — the FBI has hired 195 Arabic linguists since 9/11 although other agencies, such as the Central Intelligence Agency (CIA), have not released the number of new hires. Despite demand, the number of recruits is low due to bureaucratic problems and the difficulties Arab Americans face in getting top-level security clearances. Similar to other U.S. immigrant groups in the past, they are viewed as suspect simply because of their origin. Although the term "Arab American" is often used, it remains misunderstood. Who exactly is an Arab American? Are all Arab Americans Muslim? Has the immigration rate of Arab Americans decreased as a result of 9/11? What has been the net fall-out effect of 9/11 on this group? This article will provide definitions, look at flow data from recent years, and examine the trend of immigration and security policies affecting Arab Americans. Definitions Arab Americans are the immigrants (and their descendents) from the Arabic-speaking countries of the Middle East and North Africa. Under this classification, Arabic-speaking countries include the members of the Arab League and range from Morocco in the west to Iraq in the east (see sidebar). Individuals from Iran and Turkey, where the predominant languages are Farsi and Turkish, respectively, are not considered to be of Arab origin even though these countries are part of the Middle East. According to the U.S. Census Bureau, Arab Americans are those who responded to the 2000 census question about ancestry by listing a predominantly Arabic-speaking country or part of the world as their place of origin. The main Arab-speaking countries cited in the 2000 census included Egypt, Iraq, Jordan, Lebanon, Morocco, Palestine, and Syria. Although some people from Arabic-speaking countries identify themselves as Arab, many do not but are regularly defined as such in the United States by the government and the average American, adding further weight to the term. Because some choose a national identity, such as Lebanese or Egyptian, over the term Arab, the diversity of the community must be recognized at the outset of any discussion about Arab Americans. In truth, there are hot debates about whether there is one or many communities of Arab Americans because of the distance, both physical and emotional, between various groups. In regards to religious affiliation among Arab Americans, surprisingly few studies have been done. However, the Arab American Institute, based on a 2002 Zogby International poll, estimates that 63 percent of Arab Americans are Christian, 24 percent are Muslim, and 13 percent belong to another religion or have no religious affiliation. The Muslim Arab-American population includes Sunni, Shi'a, and Druze. Among the Christians, 35 percent are Catholics (Maronites, Melkites, and Eastern Rite Catholics), 18 percent are Eastern Orthodox (Antiochian, Syrian, Greek, and Coptic Christians), and 10 percent are Protestant. The high proportion of Christians among Arab Americans is partially due to the descendants of Arab immigrants who arrived in the late 19th and early 20th centuries; they mostly came from Mount Lebanon, an area inhabited by Maronite Christians and Druze that is now in Lebanon. Also, minority groups — Maronites and Orthodox Christians from Lebanon, Coptic Christians from Egypt, Shia' Muslims and Chaldeans from Iraq, and Orthodox Christians from Palestine — are immigrating to the United States today in larger numbers than the majority Sunni Muslim population of the Middle East. How Arab Americans Are Counted Unlike Asian, white, or black, "Arab" is not a racial category for the Census Bureau. Rather, Arab Americans are considered white, defined by the Census Bureau as "a person having origins in any of the original peoples of Europe, the Middle East, or North Africa." This distinction dates back to court decisions from 1913 to 1917 on the "whiteness" of Syrian and Palestinian immigrants. Arab Americans who received only the short form of the 2000 census, which is sent to all U.S. households, could check the "white" box for race; if they self-identified as "other" and then identified themselves on the long form as a person from the Middle East or North Africa, the Census Bureau reassigned them to the "white" category. This classification system is in line with other federal guidelines on race and ethnic standards, as set out by Directive 15 by the Office of Management and Budget, and therefore is present in many administrative forms. Since the 2000 census, the Census Bureau has published two reports on Arab Americans, both of which are based on the long form that asks about ancestry and is sent to only one-sixth of all U.S. households. The first report, issued in 2003, reported that about 1.2 million people in the United States reported Arab ancestry alone or in combination with another ancestry. The second report, issued in 2005, focused on the 850,000 people who reported at least one Arab ancestry and no non-Arab ancestries (see Table 1 and Figure 1). Therefore, a person of British-Egyptian heritage would have been included in the first report and excluded from the second. In both reports, the Census Bureau differs from the Arab League membership definition in that it excludes those from Mauritania, Somalia, Djibouti, Sudan, and the Comoros — countries that are members of the Arab League and include large Arabic-speaking populations. Arab-American organizations estimate that the Census Bureau counted only one of every three Arab Americans in 2000, and therefore these organizations estimate the number at approximately 3.5 million, or 1.2 percent of the total U.S. population. This 3.5 million estimate of Arab Americans in 2000 also includes those of mixed Arab and non-Arab heritage, unlike the 2005 Census report. Another way to examine the Arab-American population is to look at the foreign-born population from Arab countries. Although the media portray the Arab-American population as wholly foreign born, the 2005 census report found that only about 50 percent of Arabs in the United States were foreign born; of these, about half were naturalized U.S. citizens and the other half were not citizens. Therefore, half of the Arab Americans in 2005 report were either born in the United States or born abroad to U.S.-citizen parents. Of the foreign born, 46 percent arrived between 1990 and 2000, compared to 42 percent of the total foreign-born population. Immigrant and Nonimmigrant Flows Since 9/11 Many assume that the immigration of Arabs to the United States decreased after 9/11. However, the numbers of those admitted as immigrants or those who became legal permanent residents from Arabic-speaking countries has remained level at around four percent of the total number of foreign nationals admitted as immigrants to the United States, even though there was a drop in 2003. In 2005, over 4,000 nationals from Egypt, Iraq, Lebanon, Morocco, Somalia, and Sudan, in addition to an unknown number of Palestinians, became permanent residents (see Table 2). What has dropped drastically post-9/11 is of nonimmigrants who are issued visas and admitted to the United States as tourists, students, or temporary workers. The largest numerical drop between 2000 and 2004 (70 percent) has been in the the number number of tourist and business visas issued to individuals from Gulf countries, which include Kuwait, Saudi Arabia, Bahrain, Qatar, United Arab Emirates, and Oman. Although there was a decrease in the number of all incoming foreign students between 2001 and 2004, the number of student visas issued to individuals from Arabic-speaking countries dropped substantially. The greatest numerical drop, from 19,696 student visas in 2000 to 6,826 in 2004 (65.3 percent), came from the Gulf countries. The number of Egyptians who entered on student visas dropped 52.7 percent between 2000 and 2004 (see Table 3). One of the first reasons cited for the decrease in the number of foreign students was increased security measures, particularly the Patriot Act and its provision that required the implementation of the Student and Exchange Visitor Information System (SEVIS). SEVIS is an online database that monitors international student compliance with immigration laws by requiring all schools to be certified and to regularly update information on each foreign student, including their visa type, status as a student (full-time enrollment is required), biographical information, class registration, and current address. Recent reports by the Government Accountability Office (GAO) and the Institute of International Education (IIE) found that the decline in the number of international students is not due to SEVIS but, according to IIE, to "real and perceived difficulties in obtaining students visas (especially in scientific and technical fields), rising U.S. tuition costs, vigorous recruitment activities by other English-speaking nations, and perceptions abroad that it is more difficult for international students to come to the United States." Increasing global competition for the best students has added to the drop in the numbers of international students. While these reasons may be the most significant deterrents for all international students, such observations do not adequately answer why the number of Arab students has been disproportionately reduced. The numbers of visitors for business and pleasure has similarly decreased. Businessmen and tourists from the Gulf went from 84,778 in 2000 to 25,005 in 2004, a 70.5 percent decrease. The number of Egyptian visitors dropped 51.5 percent, from 48,904 in 2000 to 23,742 in 2004. The decrease in the number of both visitors and students from Morocco, Jordan, and Lebanon was also significant but lower than that of Egypt and the Gulf states. The causes for these declines have not been investigated although some researchers cite visa delays and fears of discrimination. Security-Related Policy and Arab Americans Another consequence of 9/11 has been the increased monitoring of Arab and Muslim Americans for security reasons. Although most FBI interviews of Arab and/or Muslim Americans have been conducted voluntarily, the increased attention has caused tension, nervousness, and concern to many individuals, as well as community leaders and organizations. A two-year study conducted by the Vera Institute of Justice and funded by the National Institute of Justice, a research agency of the U.S. Department of Justice, confirmed that 9/11 had a substantial impact on Arab Americans and their perceptions of federal agencies, particularly the FBI. The report states, "Although community members also reported increases in hate victimization, they expressed greater concern about being victimized by federal policies and practices than by individual acts of harassment or violence." A major issue of concern remains the 2001 Patriot Act and its provisions that allow increased surveillance without approved court orders. The number of people who have been charged or convicted for terrorism under the act is unclear. In June 2005, President Bush stated that over 400 charges were made as a result of terrorism investigations, but in almost all of these cases, the federal prosecutors chose to charge the plaintiffs with nonterror charges, such as immigration violations. Under the Patriot Act, anyone asked for information about an individual or group of people by the FBI has a gag order placed on them, regardless of whether the identity of the individual becomes public knowledge. In December 2005, President Bush confirmed that he authorized warrantless searches in which the National Security Agency (NSA) monitored phone calls and emails from possibly thousands of citizens and others in the United States who contacted persons abroad. Despite the former NSA director’s reassurances that the program was targeted and focused on persons associated with Al Qaeda, Arab Americans are concerned about the legality of warrantless searches, and the program has increased feelings of being targeted and put under surveillance due to their ethnic background and contact with friends and family in the Middle East. In 2006, several organizations filed lawsuits challenging the legality of warrantless domestic spying as well as the release of thousands of customer phone records by BellSouth, AT&T, and Verizon, citing violation of privacy. In addition, in 2003, the Department of Homeland Security implemented the National Security Entry/Exit Registration System (NSEERS), which required males over the age of 16 from certain countries who had entered the United States since October 2002 to report to immigration offices to be photographed and fingerprinted on an annual basis. Shortly after NSEERS was implemented, immigration authorities fingerprinted, photographed, and questioned 80,000 men. It is not known how many individuals were Arab, but 19 out of the 25 countries on the NSEERS list were Arabic-speaking. Although the main features of this program were suspended in December 2003, nationals of some countries — Iraq, Iran, Libya, Sudan, and Syria — are still bound by the NSEERS requirements. As a result of NSEERS and other initiatives, the number of deportations from the Arab countries on the NSEERS list and an additional five predominantly Muslim countries also on the list increased 31.4 percent in the two-year period following 9/11. The percentile rise in deportation orders for nationals of other countries was 3.4 percent in comparison. Human rights, civil liberties, and Arab-American organizations believe these facts point to a trend of profiling and patterns of selective enforcement of immigration laws. Together, these security and immigration measures have given the impression that the U.S. government believes Arabs and Muslims to be a suspicious and dangerous group to whom constitutional rights and liberties do not apply. Looking Ahead One of the long-term consequences of 9/11 was a questioning of identity and the outward expression of ethnicity and religion. In the last five years, many Arab Americans have asked themselves, How do I present myself when the mention of my ethnicity and/or religion is enough to make others uncomfortable? While some have decided to hide their heritage or privilege another ethnic background — also the reaction of some German Americans after World War I and Japanese Americans after World War II — others have channeled this dilemma into artistic expression. As a result, Arab-American arts have blossomed. Fiction and poetry — particularly by Arab-American women — art exhibits, and comedy acts have found their way into the public domain, giving Arab Americans a more human face. However, heightened security fears and recent terrorist attacks in Europe have kept the Arab American community under the microscope of the FBI and NSA. The perception of surveillance that dominates many local and national-level discussions between Arab Americans and these agencies is not likely to decrease unless pending lawsuits result in the courts finding the warrantless searches or the release of phone records to be unconstitutional and a violation of due process or privacy. Islamophobia Adv – Surveillance Bad Fear of terrorism results in targeting of Muslims. Unegbu, Howard University JD candidate, 2013 [Cindy, 57 How. L.J. 433, “NOTE AND COMMENT: National Security Surveillance on the Basis of Race, Ethnicity, and Religion: A Constitutional Misstep” Lexis, accessed 7-6-15, TAP] INVASIVE SURVEILLLANCE MEASURES After the 9/11 attacks, domestic fear of future terrorist attacks grew, spurring the national government's focus of more intrusive levels of surveillance. 56Link to the text of the note The government's focus on national security surveillance was indicative of the ballooning of the post-9/11 national security budget, the expansion of technological abilities, and the almost complete unaccountability and secrecy of national security covert operations. 57Link to the text of the note Former Vice President Dick Cheney, a well-known advocate of the government's surveillance programs, has argued that the surveillance programs are necessary if terrorist attacks are to be stopped. 58Link to the text of the note Other major political figures, like Robert Mueller, the current director of the FBI, assert that the loss of privacy for everyday Americans is justified because the eavesdropping has thwarted terrorist plots. 59Link to the text of the note In an address to Congress in 2013, Mueller stated that the "challenge in a position such as I have held in the last 11 years is to [444] balance on the one hand the security of the nation and on the other hand the civil liberties that we enjoy in this country." 60Link to the text of the note Following 9/11, the government instituted specific profiling of U.S. nationals who were residents or citizens of a foreign country of interest and were traveling through the airways. 61Link to the text of the note After the Abdulmutallab attack, the Obama administration reinstated this airport profiling of approximately fourteen countries, most of which were majority Muslim countries. 62Link to the text of the note This program may be similarly compared to the National Security Entry-Exit Registration System Program implemented by President George W. Bush in 2002. 63Link to the text of the note Critics of the 2002 program noted that it failed to capture any terrorists, yet it placed approximately 14,000 of the individuals into deportation proceedings. 64Link to the text of the note This program required male nationals from twenty-five countries, twenty-four of which were predominantly Muslim, who were working, visiting, or living in the United States to report to immigration authorities for fingerprinting and interviews. 65Link to the text of the note Critics of both programs contend that the singling out of individuals from these countries has the effect of singling them out because of their religion or nationality. 66Link to the text of the note Government informants are inserted into Islamic communities to create “terrorist plots” where none exist Al-Arain, 14 (Abdullah Al-Arian, Assistant professor history at Georgetown, School of Foreign Servicein Quatar, “The Informants: Manufacturing Terror”, http://www.aljazeera.com/indepth/opinion/2014/07/informants-manufacturingterror-20147218131267614.html, Al Jazeera Media Network, 21 Jul 2014) On the surface, the scene unfolds without any hint of intrigue. A young Muslim convert named Darren Griffin meets fellow congregants at a local mosque in northwest Ohio. In addition to sharing the same faith as his new friends, they enjoy similar interests: watching sports, playing video games, working out at the local gym, and discussing international affairs. Except the scene ends tragically with a string of arrests, a national media frenzy, and self-congratulation among federal officials claiming to have foiled yet another terrorist plot. The only problem is that Griffin was an FBI plant and the terror plot he supposedly helped thwart was entirely manufactured by the United States government. Purely on the strength of Griffin's aggressive recruitment tactics, three young American Muslims received prison sentences ranging from eight to 20 years. Similar scenarios have played out in many cities across the US during the past decade. "Informants", the new documentary film from Al Jazeera's Investigative Unit, explores a phenomenon that has been far more pervasive than the media, government officials, or community leaders have acknowledged. In addition to sharing the heart-wrenching stories of the victims of these entrapment tactics, the film is unique because it shines a light on the informants themselves, highlighting the crucial role that they played in actively enlisting young men who never demonstrated any inclinations toward engaging in violence. The informants In order to understand how the use of paid informants became such a crucial cog in the FBI's counterterrorism policy, one need only trace the major shift in the US national security paradigm after 9/11. Prior to the September 11 attacks, the FBI employed 10,500 agents, about 2,500 of whom were dedicated to national security investigations. After 9/11, however, the overall number of agents expanded to 13,600, half of whom became devoted to national security. The annual budget of the FBI has risen dramatically from $3.1bn in 2001 to $8.4bn in the current fiscal year. Together, expanded budgets, the availability of advanced technological capabilities, and a permissive political climate combined to create an environment where federal law enforcement agencies enjoyed vastly expanded powers but were also expected to demonstrate immediate results. In the course of investigating American Muslims for possible terrorist threats, the government cast a wide net. It placed tens of thousands of Muslims under constant surveillance, infiltrated community spaces, including mosques, dug through private records, interrogated many Muslims because of their political views and probed for any links to violent activities. These investigations largely turned up nothing, and that was a problem. In order to continue to justify the robust expenditure of resources and the expansive investigative powers, officials needed results in the form of thwarted terrorist plots that demonstrated to American citizens that unless the FBI acted, the next attack was right around the corner. That climate of fear helped rationalise many of the country's worst civil liberties violations committed under the Bush Administration and consolidated as standard practice during Obama's presidency. To sustain the perception of the threat, one had to be created where it did not exist. Enter the informants. As Al Jazeera's investigative film lays out, many of the most high-profile terrorism cases of the last decade were not a product of insidious Muslim sleeper cells uncovered by skillful investigators. Rather, in the absence of actual plots, the FBI actively targeted communities, identifying particularly vulnerable individuals, and sending them informants with the expressed purpose of ensnaring them in a conspiracy. The informants are not government agents. Rather, they are almost always criminal offenders attempting to avoid prison time through their cooperation with the government. From drug dealing to fraud, their criminal history ostensibly provides them the tools they need to maintain their deception, though a crash course on basic Islamic beliefs and rituals is a must. With codenames like "The Trainer", "The Closer", and "The Bodybuilder", they play to their particular strengths while identifying the weaknesses of those they are sent to entrap. In the case of the latter, Craig Monteilh hung out in mosques where he hoped to meet Muslim youth and invite them to work out at a local gym. There, he could ostensibly engage them in conversation about volatile political subjects and broach the topic of terrorism over an intense workout regimen. When his aggressive posture provoked suspicion on the part of community members in southern California, local leaders reported Monteilh to the FBI, apparently not realising that it was the FBI which had sent him into their community in the first place. The community's experience with the "Bodybuilder" is particularly egregious, given the seeming vindictive nature of the FBI's conduct in that case. The local imam, Sheikh Yassir Fazaga, dared to question publicly the veracity of claims made by a local FBI official at a town hall meeting. "The FBI does not take that lightly," Monteilh recalled to Al Jazeera. "So they had me get close to Mr Fazaga, to get into his inner circle." When Monteilh failed to ensnare Fazaga or any other local Muslims into a terrorist plot the FBI attempted to pursue immigration charges against Ahmadullah Sais Niazi, an Afghan immigrant who was one of those who reported Monteilh to the FBI for his suspicious behaviour. But the Department of Justice eventually dropped those charges and so Operation Flex, it seems, ended in failure. This case, however, was the exception. The overwhelming majority of so-called "pre-emptive prosecutions" end in convictions on terrorism charges of individuals who the government is unable to prove would have ever entered into a violent plot on their own accord. More often than not, the FBI targets young Muslims with strong political opinions, usually concerning the role of the US in the plight of Muslims in places like Iraq, Syria, Palestine, and Kashmir. As a former FBI special agent told Al Jazeera about the Ohio case, "The whole purpose was to verify whether it was more than just talk." By treating the political opinions of American Muslims as cause for suspicion, government investigators operate on the assumption that free speech rights guaranteed by the First Amendment of the US Constitution do not extend to a particular segment of the American people. Over the years, the FBI's actions have had a dramatic chilling effect on the ability of Muslims to express their political views. Motivated by such pressures from the government, many community leaders around the country have since attempted to suppress political expression in mosques and community centres. But absent such healthy community spaces through which to channel passions for humanitarian concerns around the globe, it actually becomes more likely that young Muslims could channel their frustrations through alternative modes of oppositional politics. This type of quietist, disaffected atmosphere sanitised of all political expression is precisely the environment in which agent provocateurs thrive. Exploiting poverty In some cases, there is not even any "talk" to motivate the FBI into infiltrating communities. The Liberty City case with which Al Jazeera's investigative film begins concerns a group of impoverished black men in Florida with no history of political activism or inflammatory speech. Nevertheless, the FBI sent in "The Closer" a fast-talking informant named Elie Assaad who operated as the ringleader for an alleged plot to blow up the Sears Tower in Chicago. Swaying the impressionable and impoverished young men with promises of everything from shoes to wear to large sums of cash, Assaad enlists Rothschild Augustine and six others in his conspiracy. The use of informants to target communities is one of the most alarming trends to have developed since 9/11, as it threatens to undo the fabric of a free society. In relaying this story to Al Jazeera's investigators, Assaad and Augustine reveal a number of disturbing practices in the concocted plot. The FBI specifically selected its own south Florida offices as a surveillance target, attempting to position itself as the victim of the conspiracy rather than the originator of it, despite the fact that there is no indication that the men even knew where or what it was. The ceremonial oath of allegiance to al-Qaeda that Assaad administered to the seven men displayed what can only be described as a symbol of the cartoonish imagery with which many in the US government associate Islam and Muslims. Perhaps most worrisome in the case of the Liberty City 7, and an eerily similar case in New York, is the ways in which the FBI has exploited the endemic poverty and social problems from drug use to lack of education that are prevalent within some black communities across the US in order to construct the perception of a terrorist threat. In the latter case, the Newburgh Four were promised a payment of $250,000 by a government informant who they hoped to manipulate in turn. The Newburgh Sting is an HBO documentary, also premiering soon, which chronicles the government's excesses in carrying out this plot and the devastation it has caused to an impoverished community. A startling report utilising the Department of Justice's internal statistics recently stated that in the decade after 9/11, 94.2 percent of federal terrorism convictions were obtained, at least in part, on the basis of preemptive prosecutions. Given how pervasive this practice has been, it is noteworthy that American Muslim civil rights groups have not developed a coordinated response to what has plainly become a widespread use of informants nationwide. In some instances, they have even attempted to downplay the problem of preemptive prosecutions, as in one report by a prominent American Muslim organisation that states that "while the numbers clearly show informants are frequently used by federal law enforcement, a majority of these cases do not involve them at all." The use of informants to target communities is one of the most alarming trends to have developed since 9/11, as it threatens to undo the fabric of a free society. That these recent investigative films have laid bare this troubling phenomenon and displayed its consequences for all to see, is a critical first step in confronting its damaging effect not only on the vulnerable American Muslim community but on American society as a whole. Current domestic surveillance policies promote Islamophobia and discrimination against Muslim-Americans. Greenwald & Hussain 14 (Glenn & Murtaza. Glenn Greenwald is a constitutional lawyer, journalist, and author of four bestselling books on law and politics, including No Place To Hide which discusses the American surveillance state.. Murtaza Hussain is a journalist and political commentator with focuses on human rights and foreign policy. “Meet the Muslim-American leaders the FBI and NSA have been spying on.” Occupy. 7-10-2014. Accessed 7-7-2015. http://www.occupy.com/article/meet-muslim-american-leaders-fbi-and-nsahave-been-spying) The National Security Agency and FBI have covertly monitored the emails of prominent Muslim-Americans—including a political candidate and several civil rights activists, academics, and lawyers—under secretive procedures intended to target terrorists and foreign spies. According to documents provided by NSA whistleblower Edward Snowden, the list of Americans monitored by their own government includes: • Faisal Gill, a longtime Republican Party operative and one-time candidate for public office who held a top-secret security clearance and served in the Department of Homeland Security under President George W. Bush; • Asim Ghafoor, a prominent attorney who has represented clients in terrorism-related cases; • Hooshang Amirahmadi, an Iranian-American professor of international relations at Rutgers University; • Agha Saeed, a former political science professor at California State University who champions Muslim civil liberties and Palestinian rights; • Nihad Awad, the executive director of the Council on American-Islamic Relations (CAIR), the largest Muslim civil rights organization in the country. The individuals appear on an NSA spreadsheet in the Snowden archives called “FISA recap”—short for the Foreign Intelligence Surveillance Act. Under that law, the Justice Department must convince a judge with the top-secret Foreign Intelligence Surveillance Court that there is probable cause to believe that American targets are not only agents of an international terrorist organization or other foreign power, but also “are or may be” engaged in or abetting espionage, sabotage, or terrorism. The authorizations must be renewed by the court, usually every 90 days for U.S. citizens. The spreadsheet shows 7,485 email addresses listed as monitored between 2002 and 2008. Many of the email addresses on the list appear to belong to foreigners whom the government believes are linked to Al Qaeda, Hamas, and Hezbollah. Among the Americans on the list are individuals long accused of terrorist activity, including Anwar al-Awlaki and Samir Khan, who were killed in a 2011 drone strike in Yemen. But a three-month investigation by The Intercept—including interviews with more than a dozen current and former federal law enforcement officials involved in the FISA process— reveals that in practice, the system for authorizing NSA surveillance affords the government wide latitude in spying on U.S. citizens. The five Americans whose email accounts were monitored by the NSA and FBI have all led highly public, outwardly exemplary lives. All five vehemently deny any involvement in terrorism or espionage, and none advocates violent jihad or is known to have been implicated in any crime, despite years of intense scrutiny by the government and the press. Some have even climbed the ranks of the U.S. national security and foreign policy establishments. “I just don’t know why,” says Gill, whose AOL and Yahoo! email accounts were monitored while he was a Republican candidate for the Virginia House of Delegates. “I’ve done everything in my life to be patriotic. I served in the Navy, served in the government, was active in my community—I’ve done everything that a good citizen, in my opinion, should do.” Given that the government’s justifications for subjecting Gill and the other U.S. citizens to surveillance remain classified, it is impossible to know why their emails were monitored, or the extent of the surveillance. It is also unclear under what legal authority it was conducted, whether the men were formally targeted under FISA warrants, and what, if anything, authorities found that permitted them to continue spying on the men for prolonged periods of time. But the five individuals share one thing in common: Like many if not most of the people listed in the NSA spreadsheet, they are of Muslim heritage. “I believe that they tapped me because my name is Asim Abdur Rahman Ghafoor, my parents are from India, I travelled to Saudi Arabia as a young man, and I do the pilgrimage,” says Ghafoor, when told that no nonMuslim attorneys who defended terror suspects had been identified on the list. “Yes, absolutely I believe that had something to do with it.” The FBI—which is listed as the “responsible agency” for surveillance on the five men—has a controversial record when it comes to the ethnic profiling of Muslim-Americans. According to FBI training materials uncovered by Wired in 2011, the bureau taught agents to treat “mainstream” Muslims as supporters of terrorism, to view charitable donations by Muslims as “a funding mechanism for combat,” and to view Islam itself as a “Death Star” that must be destroyed if terrorism is to be contained. John Guandolo, a former FBI counterterrorism official who takes credit for developing a training program for agents on the “Muslim Brotherhood and their subversive movement in the United States,” told The Intercept that he participated in investigations of some of the individuals whose email accounts were monitored. Echoing the “red under every bed” hysteria of the McCarthy era, Guandolo believes that “hundreds” of covert members of the Muslim Brotherhood are active in the United States, that some of them have succeeded in infiltrating the Pentagon, and that CIA director John Brennan is a secret Muslim. Other former and current federal officials say such beliefs are not representative of the FBI or Justice Department. But blatant prejudice against Muslim-Americans is also documented in the Snowden archive. In one 2005 document, intelligence community personnel are instructed how to properly format internal memos to justify FISA surveillance. In the place where the target’s real name would go, the memo offers a fake name as a placeholder: “Mohammed Raghead.” The vast majority of individuals on the “FISA recap” spreadsheet are not named. Instead, only their email addresses are listed, making it impossible in most cases to ascertain their identities. Under the heading “Nationality,” the list designates 202 email addresses as belonging to “U.S. persons,” 1,782 as belonging to “non-U.S. persons,” and 5,501 as “unknown” or simply blank. The Intercept identified the five Americans placed under surveillance from their email addresses. It is unclear whether the government obtained any legal permission to monitor the Americans on the list. The FBI and the Justice Department declined to comment for this story. During the course of multiple conversations with The Intercept, the NSA and the Office of the Director of National Intelligence urged against publication of any surveillance targets. “Except in exceptional circumstances,” they argued, surveillance directly targeting Americans is conducted only with court-approved warrants. Last week, anonymous officials told another news outlet that the government did not have a FISA warrant against at least one of the individuals named here during the timeframe covered by the spreadsheet. The FISA process was enacted in 1978 in response to disclosures that J. Edgar Hoover and a long line of presidents from both parties had used U.S. intelligence agencies to spy on dissidents and political enemies. Intended to allow authorities to covertly investigate suspected spies or terrorists on U.S. soil, the surveillance is often used simply to gather intelligence, not to build a criminal case. The law was revised in 2008—in part to place limits on the controversial program of warrantless wiretaps initiated by George W. Bush after 9/11, and in part to legalize the program’s warrantless eavesdropping on Americans when they speak with foreign surveillance targets. Under current law, the NSA may directly target a “U.S. person” (an American citizen or legal permanent resident) for electronic surveillance only with a warrant approved by the Foreign Intelligence Surveillance Court. Because the FISC operates in complete secrecy—only the Justice Department and the FBI are permitted to attend its proceedings on domestic surveillance—it is impossible to assess how the court applies the standard of “probable cause” in cases of suspected terrorism or espionage. But its rulings are notoriously one-sided: In its 35-year history, the court has approved 35,434 government requests for surveillance, while rejecting only 12. Law enforcement officials familiar with the FISA process told The Intercept that the FISC’s high approval rate is the result of a thorough vetting process that weeds out weak applications before they reach the court. The system, they added, seeks to balance what they consider to be the essential role of surveillance in protecting national security with the civil liberties of potential targets. The NSA issued a statement that reads in part: “No U.S. person can be the subject of FISA surveillance based solely on First Amendment activities, such as staging public rallies, organizing campaigns, writing critical essays, or expressing personal beliefs.” But legal experts have long expressed concern that the secretive nature of the FISA process makes it impossible to know what level of evidence is actually used to authorize surveillance, precisely what it means to be an agent of a foreign power, or whether there is any effective oversight to protect civil liberties. “We have very little idea what this probable cause standard means in individual FISA cases,” says Patrick Toomey, a staff attorney for the National Security Project of the American Civil Liberties Union. “No FISA application or order has ever been publicly disclosed, even to a criminal defendant or his lawyer in cases where the government later brings charges based on that FISA surveillance.” A former Justice Department official involved in FISA policy in the Obama Administration says the process contains too many internal checks and balances to serve as a rubber stamp on surveillance of Americans. But the former official, who was granted anonymity to speak candidly about FISA matters, acknowledges that there are significant problems with the process. Having no one present in court to contest the secret allegations can be an invitation to overreach. “There are serious weaknesses,” the former official says. “The lack of transparency and adversarial process—that’s a problem.” Indeed, the government’s ability to monitor such high-profile Muslim-Americans—with or without warrants—suggests that the most alarming and invasive aspects of the NSA’s surveillance occur not because the agency breaks the law, but because it is able to exploit the law’s permissive contours. “The scandal is what Congress has made legal,” says Jameel Jaffer, an ACLU deputy legal director. “The claim that the intelligence agencies are complying with the laws is just a distraction from more urgent questions relating to the breadth of the laws themselves.” Government agencies have invoked a host of legal theories over the years to justify spying on Americans without obtaining individual FISA warrants. Prior to mid-2008, for example, the NSA could target Americans when they were located on foreign soil simply by obtaining an authorization from the attorney general. The NSA also relies on the so-called “FISA backdoor” to read the emails of Americans communicating with foreign targets without obtaining a warrant, and engages in the bulk collection of “metadata” from Internet service providers without individual warrants. In other cases, it can obtain a warrant against an entire organization—and then monitor the emails of individuals allegedly associated with the group. While the NSA documents do not prove that the government has been systematically monitoring the communications of political dissidents, Jaffer notes that some of the most abusive surveillance practices carried out by the FBI during the 1960s were arguably legal at a time when many Americans believed that the groups targeted by Hoover’s FBI—including antigovernment activists on the left and right—posed a threat to the country. “Some of the government’s surveillance practices today are reminiscent of those earlier abusive practices,” Jaffer says. “Today’s American-Muslim activists occupy the same position that civil-rights and anti-war activists occupied during the 1960s.” Current and former law enforcement officials reject that analogy, and say that the FISA process is too rigorous to permit any abuse. Still, several acknowledge that political speech is sometimes viewed as a sufficient reason to launch an investigation that can culminate in full-blown surveillance. “If you are a political activist calling for violent jihad—yes, that could trigger an investigation,” says Marion “Spike” Bowman, the top FBI lawyer whose office handled all law enforcement requests for FISA surveillance under the Clinton and Bush administrations. Bowman stresses that such investigations are launched only when the bureau believes that speech has crossed the line into incitement. When Edward Snowden turned over a trove of NSA documents last year, he explained that he included the spreadsheet of monitored emails because he wanted to give people subjected to electronic surveillance the opportunity to challenge the spying as unconstitutional. For years, the government has succeeded in having such challenges dismissed on the ground that the various plaintiffs lack standing to sue because they could not prove that they were personally targeted. Thanks to Snowden’s disclosures, those seeking to obtain such a ruling now have specific cases of surveillance against American citizens to examine. So do those charged with reforming the FISA process. Richard Clarke, a former counterterrorism official in the Clinton and Bush administrations, served on the recent White House intelligence review panel convened to address concerns raised by the Snowden revelations. If he had seen the NSA spreadsheet, Clarke says, he would have asked more questions about the process, and reviewed individual FISA warrants. “Knowing that, I would specifically ask the Justice Department: How many American citizens are there active FISAs on now?” he says. “And without naming names, tell me what categories they fall into—how many are counterterrorism, counterintelligence, espionage cases? We’d want to go through [some applications], and frankly, we didn’t. It’s not something that five part-time guys can do—rummage through thousands of FISA warrants.” The “FISA recap” spreadsheet offers a revealing if incomplete glimpse into the murky world of government surveillance. Each email address is accompanied by a date that appears to denote the beginning of surveillance, and another that indicates when it was set to expire. A column called “Collection Status” indicates whether the surveillance was “terminated,” “sustained,” or “pending” as of a particular date. In some cases, the spreadsheet also names the federal agency that requested the surveillance, and a terrorist group, target, or foreign power affiliated with the email address. In addition, each address has a corresponding “Case Notation” code beginning with the prefix “XX.SQF”—a designation that, according to other documents in the Snowden archive, is assigned to all “FISA accounts” as a unique identifier. The five Americans whose email accounts were placed on the list come from different backgrounds, and hold different religious and political views. None was designated on the list as connected to a foreign power. Some have come under sharp public scrutiny for their activities on behalf of Muslim-Americans, and several have been investigated by the government. But despite being subjected to what appears to be long periods of government surveillance, none has been charged with a crime, let alone convincingly linked to terrorism or espionage on behalf of a foreign power. Taken together, their personal stories raise disturbing questions about who the government chooses to monitor, and why. AT: Islamaphobia K Domestic surveillance of Muslim populations is rooted in racialized fear of the other that underpins BOTH a massive authoritarian police state as well as the broader War on Terror. Anti-blackness is not the root cause of this aff either. BUT the aff understands the history of surveillance against the black body and the way that it is now being operationalized against Muslim populations. Kundnani, New York University media culture and communication professor, and Kumar, Rutgers University media studies and Middle East studies professor, 2015 [Arun and Deepa, “Race, surveillance, and empire” http://isreview.org/issue/96/racesurveillance-and-empire, accessed 7-11-15, TAP] Discussions of the surveillance of Muslim Americans usually begin with 9/11 and make little attempt to locate them in the longer history of racial surveillance in the United States. Yet the continuities are striking, particularly for Black Muslims, who have been seen as extremists and subject to national security monitoring since the 1940s. Already in the late 1960s, Arab American student groups involved in supporting the Palestinian national movement had come under surveillance and, in 1972, the Nixon administration issued a set of directives known as Operation Boulder that enabled the CIA and FBI to coordinate with the pro-Israel lobby in monitoring Arab activists. By the 1980s, but especially after 9/11, a process was under way in which “Muslimness” was racialized through surveillance—another scene of the state’s production of racial subjects. Since all racisms are socially and politically constructed rather than resting on the reality of any biological “race,” it is perfectly possible for cultural markers associated with Muslimness (forms of dress, rituals, languages, etc.) to be turned into racial signifiers.58 This signification then serves to indicate a people supposedly prone to violence and terrorism, which, under the War on Terror, justifies a whole panoply of surveillance and criminalization, from arbitrary arrests, to indefinite detention, deportation, torture, solitary confinement, the use of secret evidence, and sentencing for crimes that “we” would not be jailed for, such as speech, donations to charitable organizations, and other such acts considered material support for terrorism. Significantly, the racial underpinnings of the War on Terror sustain not just domestic repression but foreign abuses—the war’s vast death toll in Afghanistan, Iraq, Pakistan, Somalia, Yemen, and elsewhere could not be sustained without the dehumanization of its Muslim victims. As before, racism at home goes hand in hand with empire abroad. Counterinsurgency thinking that informed the strategies used in Iraq and Afghanistan in the face of popular insurrection are also brought home to be deployed in relation to Muslim American populations. Winning “hearts and minds,” the counterinsurgency slogan first introduced by British colonialists in Malaya, and then adopted by the US military in Vietnam, reappears as the phrase that state planners invoke to prevent “extremism” among young Muslims in the United States. Counterinsurgency in this context means total surveillance of Muslim populations, and building law enforcement agency partnerships with “good Muslims,” those who are willing to praise US policy and become sources of information on dissenters, making life very difficult for “bad Muslims” or those who refuse (in ways reminiscent of the “good” and “bad” Indians). It is a way of ensuring that the knowledge Muslims tend to have of how US foreign policy harms the Middle East, Africa, and Asia is not shared with others. The real fear of the national security state is not the stereotypical Muslim fanatic but the possibility that other groups within US society might build alliances with Muslims in opposition to empire . The various measures that the US national security system has adopted in recent years flow from an analysis of Muslim “radicalization,” which assumes that certain lawabiding activities associated with religious ideology are indicators of extremism and potential violence. Following the preventive logic discussed above, the radicalization model claims to be able to predict which individuals are not terrorists now but might be at some later date. Behavioral, cultural, and ideological signals are assumed to reveal who is at risk of turning into a terrorist at some point in the future.59 For example, in the FBI’s radicalization model, such things as growing a beard, starting to wear traditional Islamic clothing, and becoming alienated from one’s former life are listed as indicators, as is “increased activity in a pro-Muslim social group or political cause.”60 Thus, signifiers of Muslimness such as facial hair, dress, and so on are turned into markers of suspicion for a surveillance gaze that is also a racial (and gendered) gaze; it is through such routine bureaucratic mechanisms that counterterrorism practices involve the social construction of racial others. Official acceptance of the model of radicalization implies a need for mass surveillance of Muslim populations and collection of as much data as possible on every aspect of their lives in order to try to spot the supposed warning signs that the models list. And this is exactly the approach that law enforcement agencies introduced. At the New York Police Department, for instance, the instrumentalizing of radicalization models led to the mass, warrantless surveillance of every aspect of Muslim life. Dozens of mosques in New York and New Jersey and hundreds more “hot spots,” such as restaurants, cafés, bookshops, community organizations, and student associations were listed as potential security risks. Undercover officers and informants eavesdropped at these “locations of interest” to listen for radical political and religious opinions. A NYPD “Moroccan Initiative” compiled a list of every known Moroccan taxi driver. Muslims who changed their names to sound more traditionally American or who adopted Arabic names were investigated and catalogued in secret NYPD intelligence files. It is clear that none of this activity was based on investigating reasonable suspicions of criminal activity. This surveillance produced no criminal leads between 2006 and 2012, and probably did not before or after.61 As of 2008, the FBI had a roster of 15,000 paid informants62 and, according to Senator Dianne Feinstein of the Senate Intelligence Committee, the bureau had 10,000 counterterrorism intelligence analysts in 2013.63 The proportion of these informants and analysts who are assigned to Muslim populations in the United States is unknown but is likely to be substantial. The kinds of infiltration and provocation tactics that had been practiced against Black radicals in the 1960s are being repeated today. What has changed are the rationales used to justify them: it is no longer the threat of Black nationalist subversion, but the threat of Muslim radicalization that is invoked . With new provisions in the Clinton administration’s 1996 Antiterrorism and Effective Death Penalty Act, the FBI can launch investigations of a suspected individual or organization simply for providing “material support” to terrorism—a vague term that could include ideological activity unrelated to any actual plot to carry out violence. While COINTELPRO violated federal laws, today similar kinds of investigation and criminalization of political dissent can be carried out legitimately in the name of countering terrorism. For Muslim populations on the receiving end of state surveillance programs designed to prevent “radicalization,” everyday life increasingly resembles the patterns described in classic accounts of authoritarianism. There is the same sense of not knowing whom to trust and choosing one’s words with special care when discussing politics, and of the arbitrariness and unpredictability of state power.64 With the 2011 leaking of some NYPD intelligence files, individual Muslims have had the disturbing experience of seeing their names mentioned in government files, along with details of their private lives. Numerous businesses, cafés, restaurants, and mosques in New York are aware that the NYPD considers them hotspots and deploys informants to monitor them. And the recent outing of a small number of NYPD informants has meant some Muslims in New York have found that relationships they thought of as genuine friendships were actually covert attempts to gather intelligence.65 Internet Freedom Adv Internet Freedom Good – Court Key Judicial Indepedence Adv JI Adv – Yes Modeling – Generic American Judicial Independence is modeled abroad-It promotes accountable governments, and human rights. Smith, 08 (is a federal judge on the United States Court of Appeals for the Third Circuit.) “PROMOTING THE RULE OF LAW AND RESPECTING THE SEPARATION OF POWERS: THE LEGITIMATE ROLE OF THE AMERICAN JUDICIARY ABROAD” accessed online 7/12/15 http://lr.avemarialaw.edu/Content/articles/AMLR.v7i1.smith.pdf The rule of law1 is fundamental to the freedom enjoyed in the United States today. John Locke explained its essential nature well before the Revolutionary War: Freedom of men under government, is, to have a standing rule to live by, common to every one of that society . . . a liberty to follow my own will in all things, where the rule prescribes not; and not to be subject to the inconstant, uncertain, unknown, arbitrary will of another man. Yet, the rule of law so central to American democracy today has deep historical roots, which long precede even Locke’s lifetime. In ancient Greece, Aristotle considered a variety of constitutions before concluding that “it is more proper that the law should govern than any of the citizens.”3 During our nation’s infancy, Thomas Paine wrote in Common Sense that “the world may know that, so far as we approve of monarchy, that in America the law is king. For as in absolute governments the king is law, so in free countries the law ought to be king; and there ought to be no other.”4 John Adams later memorialized this principle when drafting the Massachusetts State Constitution of 1780, declaring “to the end it may be a government of laws, and not of men.”5 While it was clear the rule of law would play a central role in the federal government following the Revolution, the Founding Fathers deliberated carefully for eleven years before incorporating it into the Constitution in a way that would thwart tyranny and best achieve a free, yet ordered, society.6 The success and stability of our nation today flows, in large part, from our faithful adherence to the rule of law. In addition to its central and vital role in any strong democracy,7 the rule of law has been described as an “unqualified human good.”8 It stands alone in terms of its extensive international endorsement.9 There is a wide consensus among the international community that democratic values, including the rule of law, should be universal— furthered in all nations— because these values preserve and protect human dignity, facilitate accountability in government, and allow access to the political process.10 Reflecting its own growing commitment to fostering democracy abroad, the United States has formally incorporated rule-of-law promotion in its foreign assistance efforts in conjunction with traditional monetary aid .11 The rule of law is increasingly considered one of the most valuable American exports to developing and transitioning nations .12 Effective administration of the rule of law requires an independent, transparent, and accountable judiciary.13 Because of the experience and expertise our federal judges gain in their domestic role, they are well positioned to promote the rule of law abroad. 14 And indeed, federal judges have played a significant role in the effort to advance the rule of law and the democratic values essential to it in other parts of the world. Each year, dozens of federal judges assist in presenting seminars abroad that educate and train judges in other countries on a host of topics including how to oversee a case, how to write an opinion, and the importance of impartiality. I have had the privilege of participating in at least a dozen such programs. Beyond the exhilarating human experiences these programs have provided me, I have gained some background in their structure, objectives, and efficacy. My experience has also given me reason to pause and consider some of the tensions created by the participation of the federal judiciary in efforts to promote the rule of law abroad. One of the more sensitive concerns relates to the federal judiciary’s involvement in matters that touch upon foreign policy, a province conferred by the Constitution to the politically accountable branches of government.15 Judicial participation in these efforts may also raise questions concerning government funding and compliance with judicial ethical obligations. That said, clearly defined roles for participating judges coupled with cognizance of these tensions will allow these important efforts to continue in a manner that maintains the delicate separation-of-powers balance and comports with the Canons of the Code of Conduct for United States Judges.16 JI Adv – Surveillance Key Surveillance laws are especially modeled globally. Ozan O. Varol, 15 Stealth Authoritarianism http://ilr.law.uiowa.edu/files/ilr.law.uiowa.edu/files/ILR_100-4_Varol.pdf The attacks of September 11, 2001, ushered in a new era of surveillance to combat organized crime and terrorism.234 In the United States, for example, the enactment of the USA Patriot Act provided additional surveillance authorities to federal government agencies.235 Many other countries followed suit pursuant to Security Council Resolution 1373, which requires states to change their domestic laws to criminalize terrorism and enact certain surveillance measures.236 Because these surveillance laws are often enacted with the imprimatur of international organizations, they also enjoy a certain level of legitimacy both domestically and internationally. Despite the protections they offer, surveillance laws and institutions can also be employed for two primary anti-democratic purposes. First, surveillance can chill the exercise of civil liberties. As Lilian Mitrou puts it, “Under pervasive surveillance, individuals are inclined to make choices that conform to mainstream expectations.”237 That inclination to support the status quo may impede political and intellectual diversity238 and help protect and entrench the incumbent’s stronghold on government power. In addition, the fear of being watched by the government may cause people to think and speak differently and foment self-censorship.239 Second, governments can use surveillance mechanisms for blackmail. Surveillance can permit the incumbents to gather information about dissidents to blackmail them into silence or discredit them by revealing sensitive, and perhaps embarrassing, secrets to the public.240 In many postcommunist states in Eastern Europe, for example, “secret surveillance files are routinely turned into a weapon in political struggles, seriously undermining democratic processes and freedoms.”241 The information gathered through surveillance can also serve as evidence to prosecute political opponents for non-political crimes. JI Adv – LatAm – Uniqueness – JI Low The Latin American Judiciary is manipulated by the President (retag for the country if you want) Helmke ’14 (Gretchen Helmke, University of Rochester Department of Political Science chair and specializes in comparative politics, “The Puzzle of Purges: A New Theory of Judicial Manipulation with Evidence from Latin America”, http://poseidon01.ssrn.com/delivery.php?ID=1650040660951040650811011260 05012105123084002028060035065096017069124077109105000118025018021 02200800911808312109211500306412010805408602901210102610702811709 00821080170750521251041041120050170810141091110671260901061101221 10088109094125089115116081&EXT=pdf&TYPE=2, Published August 5 2014, Accessed July 13 2015, CMT) Former Venezuelan President Carlos Andrés Pérez provides a perfect case in point. One day after the Supreme Court’s approval of the Attorney General’s accusation of Pérez for mismanaging state funds, the Senate unanimously voted to strip the president of immunity and suspend him from office (Lalander 2010: 138). Or, consider the role that the Paraguayan Supreme Court played in helping congress to oust President Cubas in 1999. Shortly after coming to office, the president issued a decree freeing his political mentor, General Lino Oviedo, from prison, where Oviedo was serving a term for his attempt to lead a coup against the previous government. In response, the Supreme Court struck down the decree and ordered that Oviedo be sent back to prison. The president’s blatant refusal to then comply with the Supreme Court order led Congress to launch its first attempt to impeach Cubas. Although ultimately it took the assassination of vice president Luis Maria Argana, and Cubas’ alleged involvement in it, to succeed in removing the president from office, the Court clearly played a vital role in exacerbating the conflict between the executive and legislative branch to the point where the president’s own survival was at stake. Putting these observations together leads to the opposite pattern of institutional behavior from that captured by conventional wisdom. Whereas insulation theories hold that political 6 uncertainty promotes judicial independence, here I claim just the opposite. In environments where politicians are frequently at risk of being removed from office early, and courts, in part, shape these prospects, the likelihood that the cooperative equilibrium leading to judicial independence obtains will be substantially reduced. Rather, rapid irregular alternations of power force politicians to adopt a warlike mentality. Instead of creating institutions, they destroy them. In turn, two possible types of judicial crises stem from this common mechanism: preemptive strikes and preventive strikes. Preemptive judicial attacks are waged by presidents who are under imminent threat; preventive judicial strikes occur whenever the threat is palpable, but more distal. The differences between former President Lucio Gutiérrez’s attack on the Ecuadorian courts and Bolivian President Evo Morales’ assault on his judiciary help illuminate this distinction. Perhaps nowhere in Latin America has the president’s manipulation of the judiciary in order to cling to power been clearer than it was under Gutiérrez. During his shortlived minority government (2003-2005), the president blatantly used the court as a bargaining chip with his allies. After threats to impeach the president began to mount, Gutiérrez made a fatal last ditch quid pro quo deal with the opposition to pack the court in exchange for the opposition dropping impeachment charges against the president. Given the immediacy of the threat to his presidency, Gutiérrez’s tactical move against the court most closely resembles a preemptive strike. Latin America is transitioning towards JI, despite political corruption and military intervention Popkin, 01 (Margaret Popkin, Executive director due process law foundation, Nov 2001 “Efforts to Enhance Judicial Independence in Latin America: A Comparative Perspective”, http://cejamericas.org/index.php/biblioteca/bibliotecavirtual/doc_view/3787-efforts-to-enhance-judicial-independence-in-latinamerica.html, accessed digitally 7/13/15, SAM) The struggle for judicial independence in Latin America remains an ongoing process, but important developments have taken place in recent years. With the exception of Costa Rica, all the countries included in this study have recently undergone a process of democratic transition after the end of authoritarian rule or, in the case of El Salvador and Guatemala, following an internal armed conflict.3 Not all of Latin America has moved in the same direction nor have all the steps taken yielded positive results. Moreover, new challenges to judicial independence have arisen in the form of massive crime waves, drug trafficking and the efforts to end it, and, in the case of Colombia, frequent threats against judges by the different parties to the armed conflict. Executive efforts to increase control over the judiciary have been undertaken in recent years in Argentina, Panama, and Peru, and concerns have been raised about potential executive intervention elsewhere. Despite the clouds on the horizon, there is substantial consensus that in many countries throughout the region, judiciaries now have a greater degree of external independence – most notably from the executive and the military -- than ever before. JI Adv – Rwanda Judicial Independence in Rwanda is good — reform in 2003 prove Rugege ’07 (Sam Rugege, Chief Justice in Rwanda who was educated at Makerere University and Yale Law school and Oxford University in England, “Judicial Independence in Rwanda”, http://www.mcgeorge.edu/Documents/Conferences/JUDIND_RUGEGE_MASTER. pdf, Published in 2007, Accessed July 13 2015, CMT) Before the 2003-2004 judicial reform in Rwanda, there was substantial corruption among judges, court clerks, and other judicial officers. As a result of these reforms, a number of measures were taken and institutional mechanisms were put in place to combat corruption in the judiciary. First, there was a vetting exercise. The employment of all judges and other court personnel was terminated, and a recruitment exercise took place based on certain criteria. First, all potential judges have to be legally qualified—they must have a minimum of a Bachelor of Laws degree. Part of the problem causing corruption was that judges were not legally qualified, and the temptation to make judicial decisions based on considerations other than law was much higher. Second, they have to be persons of integrity. Those who had a record of corruption or misconduct were excluded. Finally, in addition to the rigorous selection process, there is now a Code of Ethics30 for judges that, among other things, requires impartiality, integrity, and diligence. Article 7 states that “[i]n particular a judge shall refrain from acts of corruption and other related offences and fight against it in an exemplary manner.” Judges and court personnel with a record of corruption are dismissed. The Superior Council of the Judiciary has a committee on discipline which investigates allegations of corruption and other forms of misconduct against judges and other court personnel. Before a final decision is taken by the Council, the accused official is given an opportunity to be heard.31 AT: JI – US – Inevitable Separation of powers guarantees judicial Independence in the United States Ragsdale ’15 (Bruce Ragsdale, served as director of the Federal Judicial History Office at the Federal Judicial Center and as associate historian of the U.S. House of Representatives, “Judicial Independence and the Federal Courts”, fjc.gov, http://www.fjc.gov/public/pdf.nsf/lookup/JudicialIndependence.pdf/$file/Judicia lIndependence.pdf, Published in 2006, Accessed on July 13 2015, CMT) A central principle of the United States system of government holds that judges should be able to reach decisions free from political pressure. The framers of the Constitution shared a commitment to judicial independence, and they organized the new government to ensure that federal judges would have a proper measure of independence from the executive and legislative branches. The Constitution guaranteed that judges would serve “during good behavior” and would be protected from any reduction in their salaries, thus preventing removal by a President who opposed their judicial philosophy and congressional retaliation against unpopular decisions. These twin foundations of judicial independence were well established in the British judicial system of the eighteenth century and had been enacted by many of the new state constitutions following independence from Great Britain. But the constitutional outline for the judiciary also ensured that the court system would always be subject to the political process and thus to popular expectations. The Constitution’s provision for “such inferior courts as the Congress may from time to time ordain and establish,” granted the legislative branch the most powerful voice in deciding the structure and jurisdiction of the nation’s court system. The appointment of judges by the President, with the advice and consent of the Senate, further ensured that important aspects of the judiciary would be part of the political process. The inherent tension between provisions for judicial independence and the Judicial Independence and the Federal Judiciary ~ Federal Judicial Center 2 elected branches’ authority to define the court system has led to recurring debates on judicial tenure and the federal courts’ jurisdiction. Throughout United States history, unpopular court decisions and the general authority of the federal judiciary have prompted calls to limit judges’ terms of office, to define more narrowly the jurisdiction of the federal courts, or to limit judicial review—the courts’ authority to determine the constitutionality of laws. Underlying the debates on judicial independence have been basic questions about the proper balance of Congress’s authority to define the court system and the need to protect a judge’s ability to reach decisions independent of political pressure. The debates have also addressed the extent to which the judiciary should be independent of popular opinion in a system of government where all power is based on the consent of the governed. Other debates have raised the need for safeguards for judicial independence in addition to those provided by the Constitution. JI Adv – China – Uniqueness – JI Low China’s JI is low Weifang, 12 (He Weifang, professor of law at Peking University’s School of Law, in 2011 foreign policy named him to its list of Top 100 Global Thinkers, “The Ongoing Quest for Judicial Independence in Contemporary China”, Pg. 98-99 http://www.brookings.edu/~/media/press/books/2012/inthenameofjustice/inth enameofjustice_chapter.pdf, accessed 7/13/15, SAM) This study has examined to what extent the Chinese judiciary is politically independent, and identified and considered factors that may help explain the degree of judicial independence identified. An exploratory qualitative case study with expert interviews and supplementary secondary data was employed to answer the research question. I created a theoretical framework based on previous studies on judicial independence in authoritarian regimes which separated between four legal issue areas in which the judiciary may be independent: criminal, civil, administrative, and commercial cases. The analysis was devoted to examining the degree of judicial independence in each legal issue area with a focus on interference from both national/central and local political actors through direct case interference, ex parte communication, and policy interference. In each legal issue area I have identified and analyzed explanatory The main finding of this thesis is first and foremost that the Chinese judiciary’s independence is factors. The explanations have been discussed in relation to the existing theories embodied in my theoretical framework. low . Both central and local political organs and actors interfere with judges’ decision-making in various ways, not only through direct case interference and ex parte communication, but also through more indirect policy interference. However, it seems to be mostly local, and not central, political organs and actors that are behind the interference. In political criminal cases, I find that there is substantial political interference, especially direct case interference, both by local and central political actors. This low degree of judicial independence is explained by the regime-related theory and is therefore an expected finding. Political authorities interfere in order to sideline political opponents. In ordinary criminal cases, there also appears to be a quite low degree of judicial independence. This is unexpected and in contrast to previous theory stating that political actors lack incentives to interfere in nonpolitical matters, such as ordinary criminal cases. My findings suggest that it is actually the local police who pressures and interferes with judges in ordinary criminal cases. Their ability to interfere, and the disability of judges to handle criminal cases independently, comes from the fact that police chiefs are often also leaders of local Party organs that are in charge of overseeing the courts. The general view on crime is highly politicized in China, and central political authorities’ are concerned with social and political stability. In turn, the police have been politically empowered by the central authorities. All this has affected the independence of the judiciary in ordinary criminal cases, since the police 94 can impose their will on the courts given their political power. Furthermore, I have argued that the politicized view on crime in general and the close association between Party organs and the police can be traced back to the communist totalitarian regime. JI Adv – JI Good – Democracy JI checks corrupt government, maintains civil rights, and maintains constitutional law Hosseini, 15 (Seyyed Ebrahim Hosseini1, Mehran Ahmadi2, Sa’doun Esmaeili3, and Ako Arya4 1. PhD in International Law, Lecturer in Islamic Azad University Mahabad Branch, Mahabad, Iran 2. M.A. in Private Law, science and research University, Tabriz branch, Tabriz, Iran 3. M.A. in Criminal Law, Islamic Azad University, Damghan, Iran 4. M.A. in International Law, Lecturer in Islamic Azad University Mahabad Branch, Mahabad, Iran, March 2015, “Impact of Judicial Independence Principle on Consolidation of Rule of Law”, pg398-399, http://absronline.org/journals/index.php/masr/article/viewFile/451/470, accessed digitally 7/13/15, SAM) JUDICIAL INDEPENDENCE AND RULE OF LAW Judicial independence principle is vital in the consolidation of the rule of law in international law. This can be examined in some ways. First, the judges free of any political or apolitical pressure would employ legal principles and obligation in dealing with disputes, away from any undue external factors’ leveraging. This attitude strengthens the public respect to the courts and persuades citizens and governance to often refer to the courts to settle their disputes credibly and fairly1. The possibility of fairly settlement of disputes is a vital element in economic and political stability. Economic and political actors shall have faith in an independent and neutral arbitrator to deal with their disputes. This way, rules and regulations are respected. The judges would illuminate the ambiguities in the process of investigation with the examination and clarification of the existing rules and regulations. The judges who use the existing rules, judicial process and unbiased application of the rule to support their decisions regarding any dispute grant a predictable feature to their decisions. Predictability enables the economic and political actors to set their behavior accordingly and this way, they would noticeably help their community’s political stability and economic welloff2. Secondly, the existence of independent courts is necessary to support the individual freedom and right. Individual right might be respected by the constitutions or other rules of the governments, it is however necessary for an independent and unbiased authority to deal with the individual complaints and verdict the realization of their rights. The effective way of doing this issue by the judges is bound to ensure that there is no threat including dismissal, downgrading or even lowering monthly wages or benefits facing them3. Thirdly, the existence of independent courts is the inevitable means to obligate the government to follow the rules and regulations in force within their own territory. In a lawabiding society, the government can be held responsible by the court. Therefore, judicial independence – a division of the powers, plays a significant role in the maintenance of individual rights and freedom. The presence of independent powers would obviously provide the setting for disputes. Some disputes can be settled using political arrangements and strategies. However, it doesn’t seem logical to settle all disputes through political methods (Torbert, 2014). Considering what has been mentioned so far, we can’t help drawing this conclusion that the principle of judicial independence is of top significance in establishment and consolidation of the rule of law principle. It is the judicial independence which ultimately puts the rule of law at first and its absence means the lack of priority for the rule of law in due society. It is clear that the absence of rule of law in a society would put the law under question. As Aristotle states: where there is no rule of law, there is no constitution4. JI Adv – China – Uniqueness – JI Low China no longer wants Judicial Independence Gang 15 (Qian Gang is known for his tenure as managing editor of Southern Weekend, one of China’s most progressive newspapers, Qian Gang is one of China’s foremost journalists. Qian was also a co-creator and executive editor of “News Probe,” CCTV’s pioneering weekly investigative news program with nearly 20 million viewers. Qian collected historical documents for Chinese Boy Students, a book and five-hour documentary series on 120 young Chinese students sent to universities in the United States by the Qing government in the late 19th century, 1/14/15, China Media Project, Who gave “judicial independence” a death sentence?”, http://cmp.hku.hk/2015/01/14/37754/, 7/13/15, HDA) In recent weeks, China has slipped into a place of turmoil with respect to its discourse on the concept of “judicial independence,” or sifa duli (司法独立). The recent hostility in official circles toward what has long seemed a point of consensus within the Chinese Communist Party sends a worrying signal for rule of law in the country. On January 7, more than 100 websites in China re-posted an article from the Party’s official People’s Daily called “Our Rule of Law Cannot Travel the Same Road as the West’s ‘Judicial Independence'” (我们的法治不能 走西方“司法独立”的路子). The article, written by politburo member Zhang Chunxian (张春贤), the top leader of China’s Xinjiang Uygur Autonomous Region, kicked up a storm of confusion on China’s internet. Over the past three decades of reform, the slogan “judicial independence” has been consistently upheld as something positive. Why, now, were the tables turning? In the Maoist Era, the Term Goes “Black” In China’s pre-reform period, political discourse was a simple matter of black or red. Anything that wasn’t red, meaning accepted as a part of Mao Zedong’s official discourse, was by definition “black” — unwelcome and dangerous. After 1949, the Chinese Communist Party announced that it would “repeal all laws, acts and judicial systems of the reactionary and repressive Kuomintang government.” From that point on, the notion of “judicial independence” was mercilessly criticized, branded a “black word” (黑色词语). One of the chief goals during the first few years of Communist rule in China was to redefine the relationship between the country’s new rulers and the administration of justice. When the Provisional Organization Procedures for People’s Courts (人民法院暂行组织条例) were promulgated in September 1951, Communist authorities emphasized that courts at every level must accept the leadership and oversight of corresponding government leaders (People’s Daily, September 5, 1951). The case was made more directly in the October 30 edition of the People’s Daily that same year, which stated that “judicial work must actively serve politics” ( 司法工作必须积极地为政治服务) From 1952 to 1953, judicial organs in China engaged in what was described as a struggle “to oppose the old legal concepts” (反对旧法观念). Among the concepts on the chopping block: the belief that it was a violation of the principle of “judicial independence” for Party chiefs at the city and county levels to serve concurrently as presidents of the local court (法院院长); the belief that it intruded on the rights and responsibilities of judges to allow court presidents priority in the issuing of sentences; the belief that allowing military judge advocates to actively repress counter-revolutionaries obstructed the independent exercise of judicial organs (People’s Daily, August 22, 1952); the belief that “criminal law is subject to universality” (刑法具有世界性), that it must stress “the protection of the rights of the individual” and that “all are equal before the law” (People’s Daily, October 17, 1952). Despite this “struggle,” China’s new constitution, introduced in 1954, maintained some notion of court independence, saying in Article 78 that “the people’s courts shall exercise trials independently, subject only to the law” (人民法院独立进行审判,只服从 法律). Furthermore, the constitution made clear in Article 83 that “the people’s prosecutors at various levels shall exercise their powers independently, without interference from local state organs.” All notions of independence were tossed out the window during the 1957 Anti-Rightist Movement. The idea of judicial independence was roundly condemned in the October 9, 1957, edition of the People’s Daily. The official front-page commentary was called, “Serious Struggles Are Still Ahead on the Front Lines of the Legal System” JI Adv – JI Good – Econ/Stability Judiciary Independence key to economic growth and stability McCormack 11 (Wayne McCormack professor in the college of law at the University of Utah, 2011, Foreign Aid and Judicial Independence, http://aiddata.org/sites/default/files/wright_et_al_2015_aid_judicial_independence.pdf, 7/10/15, HDA) The post-Colonial Era has brought a new awareness and immediacy to the role of the judiciary. The rule of law is critical to the safety and welfare of any society. In the past decade, almost every nation in the world has faced crises of one sort or another. Several nations are attempting to recover from a crisis of mass violence or trying to escape a pattern of violence. Less volatile developing nations may be experiencing economic and social crises while making the transition into the global economy. Meanwhile, developed nations have hit roadblocks involving both economics and security. In all of these instances, the judiciary is a critical player, and judicial independence becomes a major concern. The articles in this Symposium address various aspects of the role of the judiciary in times of crisis. Most of them speak from the perspective of a specific country—the United Kingdom, United States, India, Iraq, and Israel. The sixth article draws on the author’s experience with the former Soviet republics and the Middle East to make the point that many governments are in transition, just as the United States was in transition for much of its history. It might not be immediately clear why the current experiences of developed countries such as the United Kingdom and the United States are considered times of crisis compared to the struggles of post-Ba’athist Iraq, or how the comparatively well-established but still maturing judiciaries of Israel and India relate to the others. The details of those correlations will emerge later, but for now, it will suffice to say that the judiciaries of all of these countries have faced challenges to their autonomy and authority, while the countries themselves have faced challenges to national security and economic stability. These articles discuss countries that are in crisis for at least three different reasons. Two countries are faced with violent threats to their population from nonstate actors: the United States and Israel. Two are in transition to new judicial models: the United Kingdom and India. Some are founding new governments: Iraq and the former Soviet countries. In the past decade, the West has mounted Herculean development efforts in a variety of settings: emerging economies (primarily in southern Asia, Africa, and South America), the former Soviet bloc, and countries embroiled in violence. In all of these settings, judges face the daunting task of achieving impartiality, maintaining their independence, and simultaneously providing some measure of accountability for their own actions. As emerging nations have struggled both politically and economically, a dominant theme has been the need for developed nations to lend expertise to developing nations.1 Among the assumptions inherent in that theme are the following. The developing nations in particular need complementary economic and legal systems; neither can exist without the other. The health of the people necessitates a functioning and at least minimally fair economic system—without which there is no point in attempting to build other systems. The operation of an economic system requires a credible legal system, one that is also functioning and at least minimally fair—without assurance that disputes will be resolved by the rule of law, little investment can occur and therefore very little productive work can be performed. Simultaneously, infrastructure needs civil engineering, food provision needs agricultural expertise, and so on. Because neither an economic nor a legal system can thrive in the chaos of wartime, there is a dilemma posed by violence and the rule of law. A justice system can hardly operate effectively in the midst of chaos, but chaos is difficult to forestall without a functioning justice system. That reality may bedevil U.S. efforts in places such as Afghanistan, but it also confronts many judges on a daily basis in societies facing lesser levels of violence. The stereotype of the judge sitting solemnly above the fray and detached from reality has opened the judiciary to some ridicule, and even some harsh attacks. While there is some merit in the stereotype, judges themselves are aware of the need to maintain connection to the real world. JI Adv – JI Good – Democracy/Econ Judicial independence key to democracy and economic growth Wright et al. 15 (Joe Wright an associate professor in the Department of Political Science at Pennsylvania State University and previously held the Jeffrey L. and Sharon D. Hyde Early Career Professorship. He completed my Ph.D. at UCLA in 2007. Prior to arriving in State College, he was a post-doctoral research associate at Princeton University and a visiting faculty fellow at the University of Notre Dame. Dr. Dietrich is an Assistant Professor of Political Science at the University of Missouri, Columbia. Prior to joining Mizzou, she was a Postdoctoral Research Associate at the Niehaus Center for Globalization and Governance at Princeton University. She received her Ph.D. in Political Science at Penn State University in 2011. Molly Ariotti is a fourth year graduate student in Political Science at Penn State, with a major field in comparative politics (minors in methods and geography). I completed my undergraduate work at Binghamton University, which consisted of a double major in Political Science and Geography. 4/6/15, Penn State University, “Foreign Aide and Judicial Independence”, http://aiddata.org/sites/default/files/wright_et_al_2015_aid_judicial_independence.pdf, 7/10/15, HDA) In the past two decades, donor governments increasingly embrace judicial independence as an important component of advancing democracy. We develop and test an argument that links foreign aid to judicial independence through the mechanism of incumbent-led democracy promotion. Because judicial independence improves the investment environment necessary for sustained economic growth, both donors and recipient governments generally have an interest in using aid resources to improve judicial independence. Thus foreign aid should increase judicial independence. During election periods, however, when judicial independence can influence the distribution of power in the recipient country, incumbents are more likely to find aid investments in an independent judiciary politically costly. Therefore, during election periods in recipient countries, donor and recipient interests are less likely to align and the relationship between aid and judicial independence should weaken. We employ an instrumental variable model to test this argument with a global sample of aid-eligible countries. The literature on the effects of foreign aid has received considerable attention among academics and policy-makers. While some evidence exists that links aggregate foreign aid flows to democratic progress (Goldsmith, 2001; Dunning, 2004; Wright, 2009; Heckelman, 2010; Bermeo, 2011), other work suggests that aid is similar to a resource curse, where “windfall” income in the form of foreign aid hinders development by supporting the survival of nonrepresentative institutions (Moss, Pettersson and van de Walle, 2006; Djankov, Montalvo and Reynal-Querol, 2008; Morrison, 2009; Bueno de Mesquita and Smith, 2009).1 Foreign aid is heterogeneous, however,2 which has prompted scholars to disagregate aid into distinct sectors and delivery mechanisms to investigate external influence on democratic change. This work demonstrates that donors are selective when allocating foreign aid across different sectors and types (Dietrich, 2013, Forthcoming) and that they carefully choose among different strategies to shape democratic change (Dietrich and Wright, 2015). Even within the individual category of democracy and governance aid, which has served as focal point for students of external promotion (Carothers, 2007; Bush, 2015), donors link aid with different outcomes and deliver the assistance using different mechanisms. For instance, donors can promote democracy via bottom-up pressure, by financing civil society groups and opposition (Finkel et al., 2008). They can also pursue incumbent-led democracy promotion tactics whereby donor governments collaborate with the incumbent government in efforts to strengthen the capacity of state institutions.3 Dietrich and Wright (2015) show that incumbent-led democracy promotion is the most common strategy among donors across time.4 This particular strategy dovetails with donor efforts to promote development as it focuses on the build-up of indigenous state capacity. Funding of civil society and opposition, on the other hand, is more infrequent. It can work against development objectives in the short-term if the bottom-up pressure causes political instability.5 In this paper, we develop and test an argument that links foreign aid to judicial independence through the mechanism of incumbent-led democracy promotion. Over time, donor governments have increasingly embraced judicial independence as an important pillar for advancing democracy. Some have even argued that the establishment of the “rule of law”, including judicial independence, is necessary before democratic deepening can occur (Carothers, 2007). Donor governments typically promote judicial independence in two ways: they can require recipient governments to engage in judicial reform through conditions attached to economic aid. Alternatively, they can directly invest in judicial reform by designing specific aid projects that guide the recipient public sector in their implementation. In both cases, donors rely on cooperation by local authorities in recipient countries. Among students of economic development, judicial independence is thought of as a sine qua non for the enforcement of property rights and contracts (Haggard and Tiede, 2011) as well as for lowering transaction costs associated with captial investment (Williamson, 1985). Over time evidence has accumulated documenting a systematic positive link between judicial independence and economic growth (Feld and Voigt, 2003; Henisz, 2000). From this growth perspective, it is easy to see how incumbents in recipient countries can benefit from institutionalizing judical review. And although donors and incumbent governments may disagree over the motives that drive the promotion of judicial independence –whether they originate in theories of democratic change or economic growth – we posit that donor and incubment goals largely align in favor of judicial independence. We expect this alignment between donors and incumbents to hold across democracies and autocracies6 but we expect it to weaken during election times, when independent courts can directly influence election outcomes.7 The conditional nature of our argument suggests that foreign aid should increase judicial independence unless judicial review becomes politically costly. As costs of judicial independence increase, which we argue occurs when incumbents stand for re-election, we expect incumbents to withdraw their support from externally funded judicial reform activities, or increase control over the judiciary branch to maintain their position of power. This incentive should sharpen when elections are more closely contested. This study contributes to our understanding of democracy promotion in two ways. First, it presents a new framework that accounts for heterogeneity among donor governments’ democracy promotion stratgies and electoral dynamics in aid-receving countries. Second, it establishes that judicial independence is not only an important area through which donors can influence the democratic process abroad. It also posits that the electoral cycle shapes incumbent governments’ incentives to use aid resources to implement judicial review. The results directly reinforce a line of work that focuses on the testing of the various causal mechanisms through which donors promote democracy abroad. JI Adv – JI Good – Econ Judicial independence creates economic growth Feld and Voigt 04 (Lars Feld is a Public Economics, Public Finance, Law and Economic. Stefan Voigt is a Development Economics, Institutional Economics, Law and Economics. 2004, ResearchGate, Judicial Independence and Economic Growth: Some Proposals Regarding the Judiciary, http://www.researchgate.net/publication/237619174_Judicial_Independence_and_Economic_ Growth_Some_Proposals_Regarding_the_Judiciary1, 7/10/15, HDA) The judiciary has frequently been called “the least dangerous branch” (e.g., Hamilton 1787/1961, Federalist Paper #78). This evaluation might be one reason why the judiciary is rarely moved to center stage during discussions concerning issues of constitution al design. To give just one example: in his treatise on “Comparative Constitutional Engineering,” Sartori (1994) deals extensively with electoral systems (majoritarian vs. proportional) as well as with the modus of electing the executive (presidential vs. parliamentary systems) but the term “judiciary” does not even appear in the index. It has, however, been hypothesized that judicial independence (JI) is one central aspect in the proper functioning of the judiciary as part of the concept of separation of powers as it has been developed by Montesquieu and further concretized by Hamilton, Madison, and Jay, the authors of the Federalist Papers. Feld and Voigt (2003) have recently presented two indicators that aim at making judicial independence measurable. Their first indicator deals with de jure independence, i.e. the independence of the superior courts as it can be deduced from legal documents. Their second indicator deals with de facto independence, i.e. the degree of independence that the superior courts factually enjoy. Estimating the impact of judicial independence on economic growth, Feld and Voigt (2003) find that while de jure judicial independence does not have an impact on economic growth, de facto judicial independence positively influences real GDP per capita growth in a sample of 56 countries. The impact of de facto judicial independence on economic growth is robust to outliers, to the inclusion of several additional economic, legal and political control variables and to the construction of the index. The authors thus conclude that judicial independence matters for economic growth. If judicial independence matters for growth, economists ought to reconsider its role when discussing issues of constitutional design. Accordingly, the main question of this paper is to ask what components of de jure and de facto judicial independence are particularly conducive to economic growth and ho w they interact with the constitutional and legal environment in the different countries.3 This investigation is based on a cross section of 73 countries extending the Feld and Voigt (2003) data set. In a first step, we replicate the result of the former paper—namely that the independence of superior courts matters for economic growth—for the extend ed data set. In a second step, we inquire into the effects of the organizational structure of the judiciary. In a third step it is asked whether institutional arrangements that are not part of the judiciary themselves have an impact on economic growth and whether there is an interaction of other constitutional and legal provisions with JI. We find that de facto JI has a robust and highly significant positive impact on economic growth. Looking at the components of de jure JI, the specification of the procedures, of the accessibility and of the term length of highest court judges in the constitution show a modestly significant positive impact on economic growth, while a wide accessibility of the highest court as well as the highest court’s power for constitutional review are negatively affecting economic growth. The other components of de jure JI do not appear to have an impact. With respect to de facto JI, no deviations from ‘normal’ average term length, low numbers of changes of the number of judges since 1960 and a competitive income of judges are the main factors influencing growth. With regard to the impact of the organizational structure of the courts on economic growth, we find no significant differences between courts organized as constitutional c ourts and courts 3 The World Bank ha s been involved in a number of programs dealing with similar, yet not identical goals: whereas our interest focuses on the independence of the judiciary from the other two government branches, the World Bank ha s often put emphasis on the efficiency of the court system . Dakolias (1999) has explained that efficiency-enhancing me asures within the judiciary can be kicked off without having to wait for the consent of th e other government branches. A more recent description of the organized differently. Concerning the additional constitutional and legal environment, our results indicate that the positive impact of de facto JI on economic growth is stronger in presidential than in parliamentary systems as well as in systems with a high extent of checks and balances. De facto JI appears to be effective independent of the age of a constitution. On the contrary, if a state is able to implement de facto JI, countries with older constitutions have a growth disadvantage. To non-economists, the approach take n in this paper might appear very odd: according to many, the primary function of the judiciary would be to enhance justice, fairness, or equity. Yet, these goals do not necessarily conflict with economic growth. If the degree to which these other goals are realized can be kept constant and different institutional arrangements promise different levels of growth (or per capita income), it makes sense to argue in favor of the implementation of those institutional arrangements that are most conducive to economic growth. In this paper, we are concerned with the economic consequences of institutional choices regarding the judiciary broadly conceived. It is thus a positive paper. As long as the underlying goal—economic growth—is shared, it can easily be turned into constitutional advice . The choice of institutional arrangements itself will, however, not be endogenized. We are thus not concerned with possible reasons of constitution-makers to choose different institutional arrangements with regard to the judiciary (for this question, see Landes and Posner 1975, Ramseyer 1994, and Ginsburg 2002). The remainder of the paper is organize d as follows: in section 2, there will be a short review of the existing literature, section 3 presents a number of hypotheses concerning the effects of JI, judicial structure and the structure of state organization on economic growth, the section 4 contains the description of our data set as well as own World Bank’s activities can be found in a recent edition of the World Development Report (2002, especially chapter 7). estimations. In section 5, some preliminary conclusions regarding constitutional design are drawn, and section 6 concludes. JI Adv – JI Good – Lesotho Judicial Independence key to Lesotho stability Ellett 13 (Rachel Ellett is Associate Professor of Political Science. Rachel received her PhD in Political Science from Northeastern University in 2008. Her research is located at the intersection of politics and law. Rachel writes on judicial politics, rule of law and development, and lawyers as political actors in southern and eastern Africa and the commonwealth Caribbean. She has conducted fieldwork in Uganda, Tanzania, Malawi, Botswana, Lesotho, Barbados and Trinidad. She recently published "Going off bench: Protecting Judicial Autonomy in Competitive Clientelist Regimes" with Alexei Trochev in the Journal of Law and Courts (2014) and "Courts and the emergence of statehood in post-colonial Africa" in Northern Ireland Legal Quarterly (2013). She has also published in Comparative Politics, PS and Law and Courts. In 2013 her book "Pathways to Judicial Power in Transitional States: Perspective from Africa Courts" was released by Routledge. Rachel consults with the U.S. based organization Freedom House and has written extensive reports on judicial independence in Lesotho and Malawi, 5/29/13, Freedom House Southern Africa, Politics of Judicial Independence in Lesotho, https://freedomhouse.org/sites/default/files/Politics%20%20of%20Judicial%20Independence% 20in%20Lesotho.pdf, 7/10/15, HDA) Lesotho is a small landlocked country entirely surrounded by South Africa. Since gaining independence from British rule in 1960 Lesotho has faced manifold challenges towards achieving political stability and sustained economic growth. The population of Lesotho remains overwhelmingly rural-agrarian and despite some economic growth, gains in GNI per capita have been small and life expectancy has dropped. In 2011 Lesotho placed below average for countries classified by the United Nations as ‘low human development.’1 Since transitioning from authoritarian rule in the early 1990s Lesotho has struggled to establish a stable multiparty democracy, particularly during election periods. These challenges are compounded by the failure to fully address fundamental governance issues such as the relationship between traditional institutions and the state.2 As is the case in all democratic states, the establishment of mechanisms of accountability is critical to political and economic development in Lesotho. To be truly effective these institutions must span the formal and informal sector and, they must transect horizontal and vertical dimensions of accountability.3 Policymakers and academics have increasingly turned their attention to the foundational importance of strong, transparent and fully functional rule of law institutions to economic and political development. First and foremost the courts’ role in resolving conflict is essential to maintenance of the rule of law. A stable and predictable investment climate is rooted in the ability of courts to apply the law in a predictable and consistent manner. Second, in transitioning democracies the courts can play an important role in acting as a restraint on overzealous executives, hegemonic political parties and human rights abusers. Given the importance of rule of law to both political and economic development, it is within this context that Freedom House Southern Africa has commissioned a report on judicial independence in Lesotho. The Lesotho judiciary’s history as paramount defender of the rule of law is uneven. Despite being infused with a fairly robust set of institutional protections and a history of strong personnel, the judiciary continues to face a number of challenges. These challenges relate to three major substantive areas: 1) long-term resources constraints, 2) public perceptions of corruption and weak independence and, 3) a hostile and unstable political environment. The goals of this report are twofold: Part I assesses the current state of judicial independence in Lesotho; Part II reviews the scope and type of interference experiences by the Lesotho judiciary. Finally, while the introduction to this report provides analysis and description of the historical backdrop to contemporary Lesotho the greater part of the analysis focuses on the last ten years (2002-2012). Each section of the report is structured around a taxonomy of judicial independence/interference. Judicial independence is compartmentalized into five broad descriptive categories; each of which contains a number of sub-elements. These sub-elements are captured through a combination of checklist items and descriptive analysis. Category i Scope of Judicial Power and Category ii Differentiation and Separation of Powers focus on the formal legal and political distribution of power as it relates to the judiciary. Category iii Internal Institutional Safeguards examines the internal factors – both formal and informal – that shape and protect judicial independence. Category iv Transparency speaks to the need for access to information in order to monitor judicial independence. Finally, Category v External Institutional support articulates the significance of judicial allies’ in buttressing strong judicial institutions. Seeking to move beyond a rigid constitutional definition of judicial independence to a more holistic approach, this framework is interdisciplinary and captures both the informal and formal relationships between courts, government, groups and individuals. The taxonomy of interference is captured across five major categories: Manipulation of Personnel, Institutional Assaults, Personal Attacks on Judges, Budget Manipulation and, Attempted Cooption of Judges. This section of the report is a straightforward description of the interference experienced by judges in Lesotho over the last ten years. The overall performance of the Lesotho judiciary exhibits no substantially serious issues related to professionalism and/or independence. After applying the framework (see Figure 2) to Lesotho three broad weaknesses were observed: 1. Separation of Powers Chronic underfunding and inadequate autonomy from the Ministry of Justice continues to be a serious drag on the performance of the judiciary. Further, it undermines institutional legitimacy in the eyes of the public and weakens the morale of judicial officers. 2. Internal Institutional Safeguards Perceptions of judicial independence in Lesotho are very weak. Perceived weaknesses are primarily due to structural problems related to the appointments procedures and internal administrative structure. 5 6 3. External Institutional Support There has been an increase in the politicization of the judiciary and attacks on judicial independence since the 2007 election. This is due in part to the amplified political volatility and subsequent split within the ruling Lesotho Congress for Democracy (LCD) party which has necessitated keeping the judiciary under tight control. 4. These weaknesses are further detailed and diagrammed in Figure 1 below: JI Adv – Yes Model – Iraq Iraq ready to model Judicial Independence Gluck 08 (Jason Gluck is a senior program officer for Rule of Law and director of USIP's Constitution-Making Program. Gluck's focus is on the design and implementation of constitution-making processes in post-conflict and transitional states. He has advised government officials and civil society actors on issues of constitutional reform in Burma, Iraq, Liberia, Libya, Sierra Leone, Somalia, Sudan, South Sudan, Yemen and elsewhere. Substantively, Gluck's areas of expertise include constitutional design, federalism and minority rights. 3/17/08, United States Institute of Peace, Judicial Independence in Iraq, http://www.usip.org/programs/projects/judicial-independence-in-iraq, 7/10/15, HDA) ROL played a key role in helping to create the Iraqi Committee for Judicial Independence (ICJI), a network of representatives from the government, judiciary, and civil society that provides crucial input on issues facing the country’s judiciary. ROL continues to work with ICJI to educate members of the judiciary and the general public on the issue of judicial independence. ROL played an important role in helping create the Iraqi Committee on Judicial Independence, a consortium of representatives from the Ministries of Human Rights and Justice, the judiciary, the legal community, civil society organizations, academia and the media from across Iraq. The ICJI has provided a forum for the development of consensus recommendations regarding the country's judicial system, and continues to consult with the Constitutional Review Committee and the Council of Representatives more generally to gain assurances for the independence of the judiciary. Following the judicial federalism conference in March 2009, ROL hosted a two-day conference on judicial independence – a particularly timely and much needed conference given that only in 2009 was the Kurdish judiciary separated from the KRG Ministry of Justice. The conference expanded on previous work by USIP to assist judicial authorities and civil society organizations in securing safeguards for the independence of the judiciary. One outcome is the consideration of opening a Kurdistan branch of ICJI. Other results from the conference and next steps will feed into a weeklong training of judges in coordination with the CEELI Institute this summer. ROL has encouraged building the capacity of the judiciary, which has been enacted through a number of Iraqi-owned developments. ICJI began hosting educational seminars for members of the Council of Representatives and has provided recommendations to parliament on constitutional amendments and draft laws impacting the independence of the judiciary. A staff member from ICJI spearheaded the first law journal in Iraq (see the first issue below), and ICJI recently successfully completed its third annual ICJI conference (report forthcoming). JI Adv – Yes Model – Brazil, Dubai Brazil, Dubai, and Ghana all looking to model there courts Georgia Law N.D. (The University of Georgia School of Law is regarded as one of the nation's top law schools. Our school offers the Juris Doctor degree (J.D.) , the Master of Laws degree (LL.M.), and the Master in the Study of Law degree (M.S.L.) and features a welcoming community in a charming locale. The challenging curriculum and experienced professors dedicated to teaching the theoretical foundations of law and providing hands-on experience make Georgia Law an excellent place for your legal studies, University Law, International Judicial Training Program (IJTP) at the University of Georgia, http://www.law.uga.edu/international-judicial-training-program-ijtp-university-georgia, 7/10/15, HDA) A strong and independent judiciary is the foundation of a democratic country's stability. The International Judicial Training Program (IJTP) seeks to foster increased judicial independence, efficiency, and accountability, thereby increasing public and investor confidence in national judiciaries. The emphasis on judicial independence, court administration, case management, ethics, continuing education, and implementation is designed to foster long-term, systemic change in participant countries. IJTP is a collaboration between the University of Georgia School of Law's Dean Rusk Center and the university's Institute of Continuing Judicial Education. Since its inception in 1998, the program has trained more than 1000 judges and court personnel at the University of Georgia School Of Law. Its participants have hailed from countries such as Argentina, Armenia, Brazil, Egypt, Ghana and the Czech Republic. IJTP facilitates reform by offering capacity-building judicial administration programs tailored to the individual needs of each participating country. Designed to introduce foreign judges and court personnel to the U.S. judicial system, IJTP hosts seminars (up to two weeks) at the UGA School of Law and at sites throughout the state and includes sessions with the Georgia Supreme Court, Georgia Court of Appeals, and other specialized courts. Examples of topics covered in prior training programs include court administration, judicial budgeting, caseload management, alternative dispute resolution, court technology, and judicial ethics and professionalism . IJTP Partnerships Brazil Since 1998, when the Supreme Court of the State of Pernambuco, Brazil, requested that its judges and court personnel be trained by the University of Georgia on issues concerning continuing education, more than fifty judges, administrators, and members of the Pernambuco judiciary have trained through IJTP. The idea was to train a cadre of judges and court personnel who would constitute the backbone of Pernambuco's Institute of Continuing Judicial Education. One of the many outcomes of the strong partnership between IJTP and the Pernambuco judiciary was the development of a Code of Judicial Conduct by the Pernambuco Supreme Court. Dubai In November 2009, IJTP traveled to Dubai and conducted 3 days of training for 30 members of the United Arab Emirates and the Bahrain judiciary in case flow management and judicial leadership. This marked the first time that IJTP partnered with a foreign organization – The Dubai Judicial Institute (DJI). Prominent speakers included Judge Doris Downs of Fulton County Superior Court, Judge David Emerson, current member of the Georgia Supreme Court Technology Advisory Committee and Judicial Counsel of Georgia; and Mark Beer, Registrar of the Dubai International Financial Centre Courts. Ghana IJTP expanded into Ghana as part of concrete plans to further extend the program's reach in other countries and regions. Rusk Center staff collaborated with Ghana Judicial Service officials to identify concrete strategies for reform within the guidelines of the Ten-Year Strategic Plan for the Judicial Service—a reform structure developed by the United Nations Development Programme's National Institutional Renewal Programme (NIRP). Under the sponsorship of this UNDP and the World Bank, members of the Judicial Service of Ghana, Ministry of Finance, and Ministry of Justice, as well as the informational technology consultant to the Judicial Service, attended a program on court automation at UGA. The training led to the implementation of a Fast Track Court in Ghana, which reduced the average time for adjudication of cases, originally five-to-seven years, to six months. This model court has drawn the attention of international donors who are willing to fund a number of additional Fast Track Courts in Ghana. JI Adv – Pakistan – Uniqueness – JI Low Judicial corruption runs rampant in Pakistan Iqbal N.D. (Nasira Iqbal, is a retired judge of Lahore High Court. She is married to Justice (R) Dr. Javid Iqbal (Sr.), Hilal-e-Imtiaz, Former Chief Justice of Lahore High Court and retired judge of the Supreme Court of Pakistan, N.d., American Bar Association, Judicial Independence Abroad: The Struggle Continues, http://www.americanbar.org/publications/human_rights_magazine_home/human_rights_vol36 _2009/winter2009/judicial_independence_abroad.html, 7/10/15, HDA) Judicial independence in Pakistan is perhaps best understood through the prism of military intervention and multiple revisions of the Pakistani Constitution. When Pakistan was created in 1947, its founders envisioned a state where the constitution would be supreme. It would provide for a division of powers among the executive, the legislature, and the judiciary, each able to function independently in its own sphere. In 1949, Pakistan’s Constituent Assembly passed the Objectives Resolution, which stated that the territories included in Pakistan would form a federation; that those internal units would be autonomous and would guarantee fundamental rights, equality before law, status, opportunity, social, economic, and political justice, freedom of thought, expression, belief, worship, and association; and that the independence of the judiciary would be fully secured. However, Pakistan has been under martial law for more than half of its sixty-one years, and its constitution has been rewritten several times during that period, notably in 1956, 1962, and 1973. These constitutions, in turn, were abrogated or suspended by military adventurers when they imposed martial law. Nonetheless, the Objectives Resolution formed the preamble of the three successive constitutions and in 1985 became a substantive part of the constitution. The constitutional provisions regarding the powers and composition of superior courtsСthose delineating the qualifications, appointment, and terms and conditions of service of judgesСin theory guarantee judicial independence. Fighting for citizens’ rights. While Pakistan has witnessed its share of dubious court decisions, it likewise has seen an honest and determined effort to seek judicial decisional independence. Among the former, the Supreme Court on three occasions relied on the doctrine of “state necessity” to declare that martial law had been validly imposed in State v. Dosso (1958), Begum Nusrat Bhutto v. Chief of Army Staff (1977), and Zafar Ali Shah v. General Pervez Musharraf (2000). Yet in 1972, after General Yahya Khan resigned and handed over power to the popularly elected government of Zulfiqar Ali Bhutto, the Supreme Court, headed by Chief Justice Hamoodur Rahman, held in Asma Jilani v. Government of Punjab (1972), that the assumption of power and the martial law proclaimed by Khan in 1969 was unconstitutional and invalid. These contradictory judgments demonstrate that whenever the constitution is abrogated or suspended, the independence of the judiciary goes into eclipse, yet when there is a civilian, democratic government, the courts assert their independence as guardians of the constitution. For the most part, courts have worked independently and for the good of the citizenry, providing relief against excesses of the executive. They have held that when a statutory functionary acts in an oppressive and unjust manner, courts have the power to grant relief to the aggrieved party. Murree Brewery Ltd. v. Government of Pakistan (1972). Similarly, courts have held that all legal steps taken by citizens are meant to advance the cause of justice, not to entrap litigants in a blind corner so as to frustrate the purpose of law. Thus a mere slip up on procedure cannot operate as an impediment to the dispensation of justice. Mir Mazar v. Azim (1993). In Shehla Zia v. WAPDA (1994), the Supreme Court expanded the fundamental rights to life and dignity by including protection of the environment and quality of life. In Mohtarma Benazir Bhutto v. President of Pakistan (1998), it held that tapping of telephones and eavesdropping by government authorities was immoral, illegal, and unconstitutional. In Sh. Liaquat Hussain v. Federation of Pakistan (1999), the Supreme Court declared that the establishment of military courts for the trial of civilians was beyond the powers enumerated in the Pakistan Constitution. Attempting to elevate the status of women, in Ghulam Ali v. Mst Ghulam Sarwar Naqvi (1990) the Supreme Court declared that no waiver by a female can deprive her of her right to inheritance of immovable property and the law of limitation would not operate as a bar to her claim. Supporting women’s right to education, the court declared that if numerous girl students qualified for admission to medical colleges on the basis of merit, the provision of special seats for female students could not restrict their number. Shirin MunirКv.КGovernment of Punjab (1990). In 2001, the Lahore High Court declared the Pakistan Citizenship Act of 1951 was discriminatory and invalid to the extent that it provides that the foreign spouse of a Pakistani male is eligible for acquiring Pakistan nationality but the foreign male spouse of a Pakistani female citizen is not entitled to this benefit. That court also held that free consent of a woman is a prerequisite for a valid marriage ( Mst. Humaira Mehmood v. State (1999)) and that murder in the name of “honor” is not merely the physical elimination of a man or a woman, it is at the sociopolitical level a blow to the concept of a free, dynamic, and egalitarian society ( Muhammad Siddique v. State (2002)). Thus, whenever the country was governed under a constitution, the judiciary acted independently to safeguard the rights of the citizens and to uphold the rule of law. But when judges were called upon to adjudicate on the imposition of martial law while the constitution was held “in abeyance,” they thought it wiser to exercise judicial prudence. They were aware that if they delivered a judgment that was not acceptable, the military dictators could remove them with impunity and replace them with eager opportunists, precipitating a descent into chaos. Pressure by the public or media for upholding the independence of the judiciary was lacking. Against this backdrop, the courts tried to ensure governance according to law rather than to the whims of military commanders. This mode of reasoning represents one strain of Pakistani judical thought, adopted by Chief Justice Muhammad Munir, which may be termed “judicial pragmatism.” It has been opposed by another, “judicial purism,” espoused by Rahman and other eminent judges who have followed his example. Recent encroachments on independence. The defining moment in the Supreme Court’s move toward judicial independence came on March 9, 2007, when Chief Justice Iftikhar Muhammad Chaudhry was suspended by General Pervez Musharraf on alleged charges of misuse of power when he did not oblige Musharraf and refused to resign. He had worked hard to clear the backlog of cases while simultaneously taking suo moto notice and deciding thousands of human rights cases of poor and vulnerable victims of injustice across the country. He gave judgments against the excesses of public functionaries regardless of the consequences. In the Pakistan Steel Mills case, he declared that the Cabinet Committee on Privatization, headed by the prime minister, grossly violated the law in selling the mills. While pursuing the case of so-called “missing persons,” he held the government responsible and observed that it was the duty of the state to protect people’s lives and to ensure their safety. He also canceled, as harmful to the environment, the New Murree Project and other urban development schemes undertaken by the government to benefit various members of the power elite. Thousands of lawyers, citizens, and the media rallied to his support. Lawyers took to the streets in peaceful processions and boycotted the courts. Ultimately, Chaudhry was reinstated by the judgment of a fifteen-member bench of the Supreme Court on July 20 of that year. On November 3, however, Musharraf preempted an impending court decision against his reelection and invoked emergency powers, suspending the constitution. Under his directions, the chief justice and seven other judges were arrested. Musharraf replaced Chaudhry with Justice Abdul Hameed Dogar. Dogar promptly obliged by declaring Musharraf validly elected as president and by declaring valid Musharraf’s National Reconciliation Ordinance, which provided immunity from prosecution to numerous corrupt public functionaries. Martial law was lifted and a considerably disfigured version of the constitution was restored on December 15. General elections were held in February 2008. On March 24, the newly elected government released Chaudhry, his colleagues, and his family from incarceration. Musharraf resigned under pressure on August 18. Asif Ali Zardari, who promised to restore Chaudhry to office, was elected president on September 6, but the restoration of the judiciary to its pre-November 3, 2007, position has still not come to pass. Those who have benefited from the judgments of a pliant judiciary, particularly by the validation of the dubious National Reconciliation Ordinance, are not eager to accept an independent judiciary. However, the lawyers’ movement and the proactive media have forced average citizens to realize that good governance, economic and social justice, peace, stability, freedom from terror, and credibility in the comity of nations cannot be achieved without an independent judiciary. The future destiny of Pakistan will be determined by the elected representatives of the people. Rule of law must be upheld by an independent, impartial judiciary. The alternative is a descent into chaos. Hon. Nasira Iqbal is a retired justice who served on the Lahore High Court in Lahore, Pakistan. A View from Kenya by Hon. Mary A. Ang’awa The lack of confidence in the Kenyan judiciary has a long history. This was recently borne out by the elections of December 2007. When the results were announced, the losers felt cheated and were angry. When they were told, “If you are not satisfied with the election results, go to court and challenge them,” they responded, “We have no confidence in the judiciary; we refuse to go to court.” As a judicial officer of twenty-seven years at that time, fourteen on the High Court of Kenya, this remark cut me to the core. Instead of organized and rational legal intervention, violence broke out and the country burned. It was a crushing blow to be unable to arbitrate, comment, or intervene in the events because a matter cannot be judicially reviewed unless it is brought before a court by any party. I attempted to join independent groups established to foster peace among the communities, but this severely limited my ability to ascertain whether there might be potential litigants among them. Some constitutional background. The Kenyan judiciary is based on the British system, with the major difference being that no jury system exists. The judiciary is comprised of three tiers, including (1) the subordinate courts, presided over by magistrates; (2) the superior courts, presided over by puisne judges of the High Court; and (3) the Court of Appeal, presided over by the judges of appeal. The judges have security of tenure, whereas the magistrates do not. Like most Commonwealth countries, Kenya adapted a constitution that was used by most of the former British colonies when they gained their independence. Nearly all of these constitutions contained the Declaration of Human Rights. In the current Kenyan Constitution, the executive powers are vested in the president as head of the executive branch, and the legislative power is vested in Parliament, but no similar enactment was made concerning the judicial authority being vested in the judiciary. This created an imbalance between the judiciary and the legislature and executive, with the outcome that the judiciary was constructed on the weakest foundation. Attempts at reform. This shortcoming, and others, of the current constitution were patently evident to many Kenyans. The chapter in the constitution on the judiciary was clearly one where the public wanted reform. The Constitution of Kenya Review Commission was established in 2002, and it was intended to be driven by the people rather than by the government. The Review Commission mandated “an advisory panel of eminent Commonwealth judicial experts” to reconsider the chapter on the Kenyan judiciary and to give its input on the proposed new constitution. Surprisingly, the Court of Appeal resisted this panel’s investigations and fielded two separate court cases to stop the review process. Similarly, a committee established for the judiciary by the chief justice ended its meetings with the commission. In protest, members of the Law Society wore yellow ribbons on their robes and took to the streets. The few judges who openly supported the review process found themselves transferred to stations far distant from the capitol, which is what happened to me. In the end, the dispute boiled down to one issue: Should there be a separate court, known as a Supreme Court, that would address constitutional issues and that would not be presided over by the current judges of the Court of Appeal? Some interested parties suggested that all the judges should resign simultaneously and reapply for their jobs afresh. This time their actual qualifications would be taken into account, such as the extent of their work experience and whether they had obtained additional academic law degrees. In May 2002, the panel of experts released a report finding a “crisis of confidence” in the judiciary. The panel suggested this was caused by the politicization of appointments of judicial officers, and it pointed to the need for a guarantee of security of tenure and for judicial remuneration to be delineated in the constitution, so that judicial officers would be protected from job uncertainty and salary cuts. They also concluded that reforms were urgently required to restore public confidence in the judiciary and that enhanced transparency, independence, and accountability were necessary. Further, they opined that widespread corruption had crippled and compromised the judiciary, regardless of the constitutional issues. Yet 2002 was an election year, and Parliament was dissolved earlier than scheduled, forcing the work of the commission to come to a halt. After the 2002 elections, a new government assumed power, ending twenty-four years of rule by the previous government. When the review process began again, a new draft that had been reworked by the government under the auspices of the attorney general was substituted for the original draft, the effect of which was to compromise it considerably. The stakeholders on the reforms of the judiciary nonetheless were of the opinion that the legal reforms contained in the new proposed draft should emphasize making the judiciary independent, accountable, and effective. The drafters opposed making reforms piecemeal. They declared that financial and budgeting autonomy for the judiciary was essential. They felt that the process for judicial appointment should be clearly outlined, as should the provisions for discipline and removal of judges from office. They similarly felt that access to justice issues and the backlog of cases needed to be made part of the reform agenda. If such reforms were enacted, they said, this would restore public confidence in the judiciary. The newly proposed constitution, which advocated land reform and many other provisions not related directly to the judiciary, was voted down in a national referendum in late 2005, and as such the 2007 general elections were held under the old rules. Further, the judicial reforms that had been instituted piecemeal in the interim, while substantial, nonetheless did not inspire confidence in the independence of the judiciary to resolve the disputes that arose after those elections. To understand this, we need to look at what comprises independence of the judiciary. To quote Wikipedia, Judicial independence is the doctrine that decisions of the judiciary should be impartial and not subject to influence from the other branches of government or from private or political interests. In most cases, judicial independence is secured by giving judges long tenure, and making them not easily removable. Some definitions of judicial independence distinguish only decisional independence and institutional independence. I am nevertheless persuaded that judicial independence may be divided into four categories that I have discussed in greater depth elsewhere. These are (1) judicial independence, which relates to the decision-making process; (2) juridical independence, which relates to the finality of the decision; (3) administrative independence, which relates to the autonomy of management of affairs; and (4) budgetary independence, which relates to being autonomous financially. Judicial self-regulation and progress. As far back as 1998, in recognition of problems within the judiciary, the chief justice set up a Committee on the Administration of Justice (commonly known as the Kwach Committee), which admitted for the first time that corruption existed within the judiciary. Unfortunately, the chief justice passed away shortly thereafter and the next chief justice did not fully implement the findings of this report before resigning when the new government came to power. In September 2003, the next chief justice established another commission, commonly known as the Ringera Commission, which prepared a report that called for the full implementation of the Kwach Committee report. It similarly noted that judicial corruption was rampant. In a separate report, the commission named twenty-five judges and eighty-three magistrates as being corrupt, and both reports were disclosed to the press. The effect was damaging. Most of the judicial officers opted to resign and take their dues. A few faced the tribunal and were reinstated. Unfortunately, the disciplinary procedures were irregular because no fair hearing was given nor strict rule of law followed. Hence, the security of tenure was compromised. The judiciary then set up a standing committee in 2005 known as the Ethics and Governance Subcommittee. Its first incarnation, known as the Onyango Otieno Committee, continued to investigate corruption. It was still so much a problem that in May 2006 Transparency International, a global organization fighting corruption, named the judiciary as the No. 6 “bribe taker” in Kenya, which was nevertheless an improvement from the No. 3 slot in the year 2004. Today, the judiciary does not appear in that list. The Onyango Otieno Committee took a different approach and kept secret the names of those found corrupt. To date, no disclosure or actions taken against those who have been found wanting has been made public, and no official report has been published by the government. This committee was followed by the Kariuki Kihara Committee in 2007, and it, too, has not published open accusations against judges or magistrates. The days when the security of tenure was curtailed by Parliament in order to fire judges appear to have passed. The executive rarely interferes in judicial decision making. The infrastructure of courts is being upgraded. Judges have been provided with computers that work well, especially in Nairobi. One of the most positive aspects surrounding the judiciary is that law reporting, which did not exist for twenty years, is now flourishing. An annual colloquium is now held regularly to interact and exchange views. The recent taxation on judges’ allowance was reconsidered. A training institute for judicial officers was established and will long be remembered as an extremely positive milestone in Kenya’s judicial reform history. Conclusion. The failure of confidence in the Kenyan judiciary can be explained by the lack of independence of the judiciary, which in turn has been compromised by corruption. To achieve this independence, the judiciary must be made autonomous and achieve budgetary and financial independence from the executive. This would require a change in the constitution to give authority to the judiciary to be independent. Kenya needs to work toward complete transparency in the selection of judges. Judges themselves must be diligent in upholding the rule of law in an environment that is conducive to doing so. In the end, we are left with a larger question: Is judicial independence and a regular adherence to the rule of law possible where only sixty-one judges of the Court of Appeal and the High Court, working together with 250 magistrates, serve a population of thirty-four million? It is only a matter of time before the Supreme Court will face calls for new measures of accountability to act as a counterweight to the new judicial independence. The trigger may be a high profile and politically-sensitive human rights case. In order to defend the new judicial independence, the Supreme Court must cultivate a public commitment to its lawmaking role by demonstrating governance improvements resulting from the new institutional arrangements. In Canada, the principal justification for the Supreme Court's role in fundamental rights cases is the ‘dialogue theory'. First popularised in a 1997 law review article by Peter W. Hogg and Allison A. Bushell, dialogue theory posits that while judges exercise discretion, they are engaged in an interactive dialogue with the other branches of government about rights issues.72 The theory places limits on the judicial role by emphasising that Parliament has the final word in the dialogue as a result of the structure of the Charter of Rights and Freedoms. 73 Dialogue theory has been expressly endorsed by the Supreme Court of Canada.74 Yet observers have pointed out that the Canadian dialogue is sometimes more like a judicial monologue given political reluctance to challenge judicial decisions that hold rhetorical advantages, particularly in human rights cases.75 In the result, legislative ‘responses' include the repeal of offending statutory provisions or the taking of other action in direct compliance with judicial directives, such as the Reference re Manitoba Language Rights case, where the legislature hastily translated its entire repertoire of statutory legislation into the French language before the Supreme Court of Canada's declaration of invalidity took effect (which would have resulted in a “legal vacuum with consequent legal chaos” given that all statutory instruments exclusively in English were held to be unconstitutional and thus invalid).76 Dialogue theory might provide some answers to the legitimacy concerns of judicial lawmaking but it is a descriptive theory in that it does not immediately justify why courts should be part of a dialogue in the first place, particularly if there is no such thing as a ‘correct' policy answer: what makes judicial values superior to the values of the executive or legislature? Some evidence relating to the improved quality of the democratic process as a result of judicial contributions may be required.77 Even as a descriptive theory, dialogue offers an idealised view that overstates the Government's participation in the discussion over rights, which is potentially misleading and could increase the comfort of courts to engage in politically-charged lawmaking: dialogue theory cuts against the grain of deference to the elected branches of government by actively seeking out the pronouncements of courts as an important part of the on-going dialogue. Despite these limitations, it seems that some form of dialogue theory looms on the horizon in the United Kingdom given the dialogic structure of the Human Rights Act.78 It remains to be seen, however, whether the Government will be comfortable sharing governance with the courts and ultimately dencentralising its political power. A further justification offered for the new judicial independence is the increased capacity of the courts to hold the executive to account. The Supreme Court has seized upon the accountability function to justify its institutional autonomy. In his February 2011 speech, Lord Phillips stated that because “the individual citizen is subject to controls imposed by the executive in respect of almost every aspect of life”, courts must review executive actions for legality, and thus “it is from executive pressure or influence that judges require particularly to be protected”.79 However, English judges have had little difficulty in holding the executive to account through judicial review for decades, so it is not entirely clear how the new judicial independence enhances this role.80 If the idea is that the scope and intensity of judicial supervision will be expanded through judicially-constructed rules as a result of the new judicial independence, it raises many of the same legitimacy concerns over judicial lawmaking as previously discussed. The impact of the new judicial independence on other judicial functions must also be considered. While this article focused on the lawmaking of appellate courts, the functions of the courts cannot be so neatly divided, especially in the public mind. Changes to one judicial function may alter the functioning of others. Emboldened and institutionally autonomous courts, wading deeper into controversial issues pitting individuals against the political majority, may undermine public confidence in the core judicial function of dispute resolution. By revealing the political nature of rights-based adjudication, the decisions of courts in controversial cases may threaten the perceived impartiality of the trial judge in resolving ordinary conflict. Paradoxically, in such a situation, the new judicial independence would counteract the very thing it was designed to do: protect the status of the judge as a third party to the dispute. As a result of this possibility, a critical eye must be cast upon the direction in which the new judicial independence leads the courts to ensure continued public confidence in the administration of justice. JI Adv – Turkey – Uniqueness – JI Low Turkey’s independence Judicial independence id declining Misztal and Michek 14 (Blaise Misztal is the director of the national security program at the Bipartisan Policy Center (BPC), having previously served as the project’s associate director and senior policy analyst. At BPC, Misztal has researched a variety national security issues, including: Iran and its nuclear program; cyber security; stabilizing fragile states; and public diplomacy in the 21st century. He has testified before Congress and published op-eds in The Washington Post, The Wall Street Journal, The Weekly Standard, The New Republic, and Roll Call. In addition, Misztal wrote and directed the 2009 “Cyber ShockWave” simulation that aired on CNN. Jessica Michek joined the Bipartisan Policy Center (BPC) as an administrative assistant for the Foreign Policy Project in February 2014, having started with BPC as an intern in May 2013. Prior to joining BPC, Michek served as a virtual intern for the U.S. Embassy in Bahrain, working to monitor trials related to the unrest in Bahrain since the Arab Spring. As an undergraduate, Michek focused her studies on the Middle East and North Africa, studying abroad in Amman, Jordan and writing her honors thesis on the impact of U.S. aid on Jordan’s foreign policy. Michek graduated with honors from Oberlin College in May 2013 with a B.A. in politics, having also received Oberlin’s John D. Lewis Memorial Prize for excellence in international politics, 12/12/14, Bipartisan Policy Center, HSYK Elections and the Future of Judicial Independence in Turkey, http://bipartisanpolicy.org/blog/hsyk-elections-and-the-future-of-judicialindependence-in-turkey/, 7/13/15, HDA) Turkey’s judiciary is losing its independence. At issue is a seeming commitment of a majority of new HSYK members to issue rulings and decrees in support of the ruling party. Indeed, progovernment candidates ran on a platform promising to “work in harmony with the executive,” proclaiming their subservience to Erdoğan and the AKP. A CHP deputy explained, “[i]t shows that the rule of separation of power is being destroyed. Constitutionally there has to be a separation of power and the judicial system has to be impartial and apolitical.” As an opposition deputy stated, “[t]his HSYK is the AKP’s.” Ahmet Gündel, a retired Supreme Court of Appeals prosecutor has voiced fear that the government may attempt to use the HSYK to punish judges and prosecutors who attempt to investigate government corruption or those who will not toe the government line. As he explained, “[t]he [members of the judiciary] will fear that they might, after a complaint against them, be reassigned to another post [in another town], be investigated or be expelled from the profession.” Indeed, the new HSYK has already acted in the government’s favor, requiring an investigation into military commanders who ordered the stopping and searching of trucks belonging to Turkey’s National Intelligence Organization (MIT) en route to Syria in January 2014. The trucks were alleged to be carrying explosives and weapons to be supplied to the Syrian opposition. While the previous HSYK did not give permission to launch an investigation into the generals involved in the incident, the government’s more agreeable HSYK readily acquiesced. JI Adv – JI Good – Nigerian Stability Nigeria Judicial Independence create stability Ige 08 (John Olagake Ige was a Justice for the Nigerian Supreme court, 11/9/08, THE INDEPENDENCE OF JUDICIARY AS A PANACEA FOR STABILITY OF DEMOCRACY IN NIGERIA: PAPER PRESENTED BY YUSUF O. ALI ESQ; SAN AT THE LUNCHEON IN HONOUR OF HON. JUSTICE OLAGOKE IGE, http://www.yusufali.net/articles/the_independence_of_judiciary_as_a_panacea_for_stability_o f_democracy_in_nigeria.pdf, 7/13/15, HDA) The issue of stability of democracy in Nigeria is a perennial one. There has been no permanent solution to recurring unstable democratic system we experience in Nigeria. However, there is no doubt; a strong and independent judiciary promotes the rule of 'aw. It checks acts of dictatorship and the rule of terror by the ruling class. It is so helpful in the promotion of justice and fair play. When the public feels confident in its adjudicator's roles, the judiciary is often described as the last hope of the common man. The judiciary as often described as the last hope of common man has a very big task ahead, this task could be illustrated by the statement made by a former judge of Lagos State High Court, Justice Akinola R. in his paper, Salute to cournge", The story of Justice Yahaya Jinadu: published by Nigerian Law Publications Ltd. In 1989 at pages 139 - 140. The Honourable Judge stated thus: "I believe the judiciary has an important role to play in this country as it is the last hope of the common man. The judiciary has to be firm, fair and courageous and must not employ any form of double standards. It is not right in my view to regard or treat the court of Justice as an extension of the Federal Ministry of Justice. I cannot cordon any attempt to destroy the judicial system in this country using me as a scape goat." In recent times, it is a matter of common knowledge that there has been a fair amount of loss of faith in the judicial process and adjudication in resolving conflicts and members of the public in certain instances preferred the use of self help, to the use of the judicial processes. The processes had been characterized with serious allegations of corruption, abuse of office, claim of ethnic lopsidedness in the appointment of judicial officers and so on. It is against the background of the above observation that this paper seeks to examine how an independent judiciary can be a viable and everlasting solution to the stability of democracy in Nigeria. Before going into the main theme of this paper, it is pertinent at this juncture to define certain terms used in the topic that is: independence, judiciary, panacea, stability and democracy i. Independence: it is freedom from control from dependence on or control by another person, organization or state, ii. Judiciary: this is a branch of government saddled with dispensation and administration of justice, iii. Panacea: it is a case of solution to an identified problem, iv. Stability: this is a quality of condition of being stable. v. Democracy: it is a free and equal representation of people in a system of government. The free and equal right of every person to participate in government often practiced by electing representatives of the people by the majority of people. It is also important to note at this juncture that this paper will be divided into some headings and I shall take the heading one after the other. JI Adv – Eastern Europe – Uniqueness – Transition Now Eastern Europe Striving for judicial independence OSCE 2010 (The OSCE has a comprehensive approach to security that encompasses politicomilitary, economic and environmental, and human aspects. It therefore addresses a wide range of security-related concerns, including arms control, confidence- and security-building measures, human rights, national minorities, democratization, policing strategies, counterterrorism and economic and environmental activities. All 57 participating States enjoy equal status, and decisions are taken by consensus on a politically, but not legally binding basis, 7/10/10, JUDICIAL INDEPENDENCE IN EASTERN EUROPE, SOUTH CAUCASUS AND CENTRAL ASIA Challenges, Reforms and Way Forward, http://www.osce.org/odihr/71178?download=true, 7/13/15, HDA) Balancing the independence of the judiciary with the need for democratic legitimacy in a society governed by the rule of law is a challenge for every participating State. The legacy of the Socialist legal tradition has shaped justice systems in a great number of OSCE participating States. After departure from the doctrine of “unity of state power”, these States in the past two decades have implemented numerous reforms, both legislative and institutional, which were intended to foster separation of powers and judicial independence. The time is now ripe for a fresh look at these efforts, to assess their success in establishing truly independent judiciaries, as well as identify remaining challenges in strengthening them. Therefore, ODIHR and the Max Planck Institute for Comparative Public Law and International Law (MPI) have undertaken an assessment of 4 the state of judicial independence across the OSCE region which provides the basis for developing an ODIHR strategy for this sector. The primary purpose of the project is to identify impediments and recognize good practices for the makeup of independent judiciaries in the participating States of the OSCE, and assist the States, with a predominant focus on Eastern Europe, South Caucasus and Central Asia, in adhering to their commitments. For the assessment phase of the project, ODIHR designed a questionnaire on judicial independence and commissioned country reports from independent experts. The questionnaire benefitted from feedback by MPI and the Council of Europe Venice Commission and covers the most relevant aspects of judicial independence, as outlined in several international instruments. Special attention has been given, inter alia, to the administration of the judiciary including budget management, the role of judicial councils, selection and appointment of judges, tenure and promotion, remuneration, case assignment systems, disciplinary procedures, immunity, ethics and resources. As second step in the assessment phase of the judicial independence project, the expert meeting in Kyiv was intended to result in concrete recommendations to the participating States on how to further strengthen judicial independence in the region. The comparative analysis of independent expert reports in the first step had led to the identification of subtopics for the expert meeting, namely (1) Judicial Administration – judicial councils, judicial self-governing bodies and the role of court chairs; (2) Judicial Selection – criteria and procedures; and (3) Accountability versus Independence in Adjudication. These subtopics were also subject to discussion at separate working sessions at the recent Human Dimension Seminar on Strengthening Judicial Independence and Public Access to Justice on 17-19 May 2010 in Warsaw. The meeting was attended by 27 prominent scholars and senior practitioners from 19 participating States, in addition to experts from ODIHR, MPI and the Council of Europe including its Venice Commission. The OSCE field presences in Moldova, Ukraine and Skopje were also represented. The meeting aimed to serve as a platform for in-depth discussion of challenges in selected areas related to judicial independence, critical examination of the impact of past reforms, as well as identification of good practice examples from participating States. Terror Adv Terror Adv – Entrapment Link Use of aggressive intelligence collection practices against Muslim communities fails and risks increased terrorism – entrapment increases false information and alienates communities. Stabile, University of California Berkeley School of Law JD, 2014 [Emily, 102 Calif. L. Rev. 235, “COMMENT: Recruiting Terrorism Informants: The Problems with Immigration Incentives and the S-6 Visa” Lexis, accessed 7-12-15, TAP] Because the FBI's post-9/11 establishment of a preventative stance towards terrorism 5Link to the text of the note has increased the need for intelligence, 6Link to the text of the note the agency has [237] turned to the increased use of immigration law and residence status to recruit more confidential informants. 7Link to the text of the note Although the FBI does not comment on its informant recruitment methods, 8Link to the text of the note numerous stories similar to Farahi's have been reported since 9/11. 9Link to the text of the note In fact, allegations of the FBI's aggressive use of past [238] violations of immigration laws to pressure individuals whom the agency believes may have terrorism knowledge have repeatedly surfaced. 10Link to the text of the note The Informants, a yearlong investigation into the FBI's use of informants, led by Trevor Aaronson and the University of California at Berkeley's Reporting Program in conjunction with Mother Jones, details the FBI's expanded use of informants in terrorism investigations. 11Link to the text of the note Of the approximately five hundred federal terrorism prosecutions conducted since 9/11, about half used an informant, 12Link to the text of the note and forty-nine of them were the result of work done by agent provocateurs. 13Link to the text of the note Aaronson's investigation also shed light on the FBI's use of immigration law and the threat of deportation to incentivize informants to cooperate. 14Link to the text of the note Aaronson explains, A typical scenario will play out like this: An FBI agent trying to get someone to cooperate will look for evidence that the person has immigration troubles. If they do, he can ask [Immigration and Customs Enforcement (ICE)] to begin or expedite deportation proceedings. If the immigrant then chooses to cooperate, the FBI will tell the court that he is a valuable asset, averting deportation. 15Link to the text of the note [239] Using the threat of immigration consequences like deportation to produce terrorism intelligence presents novel problems for the intelligence gathering process and the informants. When individuals are pressured into becoming informants by the threat of deportation, which may remove them from their family and all sources of support, the decision essentially becomes a Hobson's choice . 16Link to the text of the note Informants recruited in this manner who also lack legitimate ties to foreign terrorist organizations 17Link to the text of the note have an enormous incentive to fabricate information to fulfill their end of the agreement and avoid deportation. 18Link to the text of the note Attorney Stephen Downs of Project SALAM explained, Community life is shattered as the government often forces Muslim immigrants to spy on their own communities or give false testimony with the threat that the Muslim's immigration status will be "revised" if the Muslims do not cooperate. Such practices generate fear and alienation in the Muslim community and diminish our security rather than enhance it . 19Link to the text of the note As Downs notes, the intelligence these informants provide can be unreliable, 20Link to the text of the note because these individuals may feel they must offer up something to the government to avoid being removed from their families, jobs, and lives. The threat of false intelligence is grave. In addition to the possibility of entrapment 21Link to the text of the note by agent provocateurs, false intelligence may encourage ethnic and religious profiling of Muslim and Middle Eastern communities, 22Link to the text of the note chill free speech , 23Link to the text of the note and waste finite intelligence resources. Recruitment through [240] immigration law also affords less protection to informants than recruitment done by offering monetary rewards or reductions in sentencing. 24Link to the text of the note For example, unlike criminal offenses, there is no statute of limitations governing civil penalties like deportation, removal, or exclusion orders, which means that the FBI can use immigration violations to leverage cooperation from out-of-status individuals who have been in the country for years. Moreover, unlike an informant who is promised a sentence reduction or lessened charges and who can enforce his or her bargain with the government through plea bargaining, an informant promised immigration benefits has no way of enforcing these promises. 25Link to the text of the note Furthermore, the Sixth Amendment's guarantee of counsel 26Link to the text of the note does not apply to immigration violations. 27Link to the text of the note Finally, according to some reported cases, the government has failed to reward informants with the promised immigration benefits after receiving their cooperation. 28Link to the text of the note With fewer bargaining options, less protection, and potentially more to lose 29Link to the text of the note than informants recruited through monetary incentives or promises of sentence reductions, there is greater incentive for informants "flipped" 30Link to the text of the note via [241] immigration violations to provide unreliable information. Furthermore, due to the latitude afforded to the executive branch in national security matters, there is a darker veil of secrecy shrouding measures for recruiting terrorism informants than for other types of informants. 31Link to the text of the note Immigration status offers a valuable way for the FBI to elicit cooperation and collect intelligence from individuals who otherwise would not be forthcoming. However, this method for collecting intelligence can prove counterproductive when indiscriminately applied to situations where the informants lack useful connections to terrorist groups. Decreased intelligence benefits, lack of protection for informants, and increased ethnic and religious profiling suggest that changes to how the FBI recruits terrorism informants with immigration threats and rewards are needed. Terror Adv – Informants Key Informants are key to preventing terrorism. Stabile, University of California Berkeley School of Law JD, 2014 [Emily, 102 Calif. L. Rev. 235, “COMMENT: Recruiting Terrorism Informants: The Problems with Immigration Incentives and the S-6 Visa” Lexis, accessed 7-12-15, TAP] While there are no detailed studies on the differences between terrorism informants and traditional informants because the FBI keeps most of this information confidential, 47Link to the text of the note broad observations can still be made. First, the FBI's preventative stance on terrorism has significantly increased reliance on informants' intelligence. 48Link to the text of the note After 9/11, the FBI drastically expanded the use of [244] informants 49Link to the text of the note from around 1,500 in 1975 50Link to the text of the note to an estimated 15,000 today. 51Link to the text of the note Informants have become the number one tool for preventing terrorist acts. 52Link to the text of the note Terror Adv – Informants Key Voluntary informants are key. Stabile, University of California Berkeley School of Law JD, 2014 [Emily, 102 Calif. L. Rev. 235, “COMMENT: Recruiting Terrorism Informants: The Problems with Immigration Incentives and the S-6 Visa” Lexis, accessed 7-12-15, TAP] [254] By virtue of their connections and daily interactions, those active in a particular community are in the best position to notice when others in the community act strangely. Unlike informants who may be new to the community and who other members may view with suspicion, well-established community members may already know what is going on in their community and can more accurately spot genuine threats. Terror Adv – Uniqueness – FBI Fails Now Current FBI surveillance targets muslim communities, causing resentment of the FBI. Shamas ‘13 Diala Shamas, Diala Shamas is a staff attorney at the Creating Law Enforcement Accountability & Responsibility (CLEAR) project, based out of Main Street Legal Services at CUNY School of Law. 10-31-2013, "Where’s the Outrage When the FBI Targets Muslims?," Nation, http://www.thenation.com/article/wheres-outrage-when-fbi-targets-muslims/ our clients are targeted by FBI agents inquiring into the most intimate and protected areas of their lives stopped in front of their neighbors or children And the interrogations are far from voluntary FBI agents regularly warn our clients who invoke their right to have an attorney present that “they can do this the easy way or the hard way.” One client was so frightened by the agents’ threats that he agreed to accompany them to FBI headquarters and let them strap him to what they claimed was a polygraph machine for four hours as they peppered him with questions While the precise number of these interviews is not available we often ask for a show of hands in the room of people who have themselves been interrogated by law enforcement The interrogations have a devastating chilling effect on communities After a visit by the FBI un-joining groups and deleting the news articles he had posted in the hope that would spare him from a repeat The interrogations are also deeply stigmatizing he—the majority are young Muslim men—is perceived On a daily basis, . They are approached at night at their homes, , solicited outside their subway stops or interrogated at their workplaces in front of their colleagues and customers. GET THE LATEST NEWS AND ANALYSIS DELIVERED TO YOUR INBOX EVERY MORNING. SIGN UP . , accused him of lying and then turned around and asked him to work for them as an informant. , our experience suggests they are omnipresent. When CLEAR members facilitate Know-Your-Rights workshops at mosques in New York City, , or know others who have been, . In many mosques, every hand will go up. . Being pressed about their religious and political affiliations or their community activities inevitably makes our clients h esitate before being active in their mosque or community. , one 20-year-old client scrubbed his Facebook account, . It did not work. : when an individual is approached for questioning, by his peers as someone under investigation, and from whom people want to keep their distance Our clients regularly explain that they agreed to get into the FBI agents’ cars because they did not want to let them into their homes and expose their families I’ve had conversations with college students weighing the pros and cons of taking up a leadership position in their Muslim student group Instead of weighing their class workload against their extracurricular commitments the balancing involved exposure to further FBI questioning if they were to become more “active” Muslims and whether their past experience being questioned by the FBI would be bad for the organization . , but also did not want their neighbors to see them. . , , , as other students may hesitate to join. I can’t tag cards to save my life. US counterterrorism expansion into the Muslim-American community functions under the assumption that those individuals and groups are “terrorists” which creates a radicalization of the community and an “us v. them” mindset Williams 2012 (“Suspicious Minds: The American Consciousness, Domestic Security And The Radicalization Of Muslim-Americans”, Ronald E. Williams II, has over ten years of experience with the US Department of Justice (DoJ). His current work at DoJ involves developing and administering technical assistance in order to effectively partner with the department to combat terrorism, human trafficking, organized crime, corruption and financial crimes. Williams’ other work includes investigating allegations of racial discrimination, Guest Commentaries- Security Today, November 07, 2012 http://www.hstoday.us/columns/guestcommentaries/blog/suspicious-minds-the-american-consciousness-domestic-security-and-theradicalization-of-muslim-americans/3ede05589b6d0296ab8dc8edb5c12ca9.html) Immediately following the September 11, 2001 terrorist attacks, the priorities, energies and resources of the FBI concentrated on the proactive objective of preventing future terrorist incidents. In pursuit of this new strategy, the FBI understood that the success of this highly complex mission depended on cooperation from the Muslim-American community – specifically the need to understand its culture, history, religion and language. These early cooperation efforts were successful in part because many Muslims had sought to define themselves as Americans. And like most Americans, they, too, play an important role in ensuring domestic security, if by no other means than providing pertinent information to include identifying questionable behavior and activities. Taken at face value, these early partnerships developed into successful examples of intelligence-led policing. But if one is to seriously bisect this relationship, one would reasonably conclude that as potential terrorist suspects and targets become numerous and branches, and as deception operations become more sophisticated, domestic security and counterterrorism efforts will expand, reaching deep into the Muslim-American community, oftentimes crossing sensitivity lines, as was evidenced by the New York City Police Department’s surveillance of the region’s Muslim community. As a result of this cultural infiltration, the Muslim-American community has become, by and large, suspicious of government counterterrorism programs. The Muslim-American community has justified its suspicions on what it perceives to be American predispositions of both Islam in general, and Muslims in particular. As the American mainstream consciousness overtly claim that not all Muslims are violent, anti-American or prone to engage in terrorism while subconsciously believing the opposite and privately expressing such, the latter mindset will inevitably influence domestic counterintelligence/counterterrorism prerogatives. In the most subtle forms, these prerogatives will include identifying specific racial and ethnic groups/individuals as the sources, financiers and sympathizers of Islamic-oriented terrorism – a de facto policy that will never be officially sanctioned for it contradicts our own understanding of race neutrality. Hence, the radicalization of our own racial, ethnic and religious population will undoubtedly be the most complex challenge for our domestic security. Note that theories abound attempting to explain radicalization. Most popular among academics is the notion that a disaffected group perceives that the current government structure is the cause of some kind of injustice against them, and continues to nurture an environment of inequality (i.e. political, social, economical). With no legitimate means through which to seek redress, the group thus turns to more radical ways to demand justice and equality, oftentimes turning to violent behavior or other forms of criminal and subversive activity. While this formula may explain radicalization at the theoretical level and in homogenous environments, it does not adequately address the core elements of radicalization currently underway in the United States. If one is to fully understand American radicalization, one must critically recall the realities of American history. To be sure, any candid discussion of counter-radicalization efforts involving homegrown Islamic radicalism must first be predicated on the proposition that racialization is an indivisible element of the American consciousness. Racialization is to be defined as the process by which a racial or ethnic group is understood through the prism of racial generalizations. It is distinct from racism, which constitutes specific attitudes directed at a racial or ethnic group based on hatred of one race on the premise of inferiority. From racialization, the concept of “Us versus Them” matures, and the cultural subordination of a subordinate group by the dominate group is an accepted practice throughout the mainstream. Muslim-American radicalization is shaped by the struggle to define “American” and the community’s refusal to assimilate which causes a split between the traditional definition of the “American” and the Muslim-American communities, i.e. the “Us” v. “them” mindset which breeds resentment and radicalization Williams 2012 (“Suspicious Minds: The American Consciousness, Domestic Security And The Radicalization Of Muslim-Americans”, Ronald E. Williams II, has over ten years of experience with the US Department of Justice (DoJ). His current work at DoJ involves developing and administering technical assistance in order to effectively partner with the department to combat terrorism, human trafficking, organized crime, corruption and financial crimes. Williams’ other work includes investigating allegations of racial discrimination, Guest Commentaries- Security Today, November 07, 2012 http://www.hstoday.us/columns/guestcommentaries/blog/suspicious-minds-the-american-consciousness-domestic-security-and-theradicalization-of-muslim-americans/3ede05589b6d0296ab8dc8edb5c12ca9.html) Racial and ethnic categorization is a default mindset of the American psyche. It is deeply and skillfully woven into our national fabric, as is the ardent defense of the principles of the First Amendment. To deny this strain of our cultural DNA is to remain disadvantaged when pursuing any real efforts to understand the undercurrents of Muslim-American radicalization. Important to note is that the American public consciousness has become hyper-sensitive to the discussion of race and aloof to experiences from history. With each generation, American perceptions on race and the racial order are refined, resulting from the inherent push-pull relationship between the racial majority (“Us”) and the racial minority (“Them”). As these perceptions further root themselves into the American mainstream consciousness, the management thereof is, in truth, dominated by the racial majority. Since perceptions management is controlled by the racial majority, it stands to reason that the terms affecting the political and cultural narrative are too controlled by this majority. But in the face of bold demographic shifts, greater racial and ethnic diversity (especially without any desire to fully assimilate), and the real possibility of the racial majority becoming the numerical minority, control of the narrative becomes a strategic objective. Here, the starting point of the narrative revolves around two ideas: 1) How is “American” defined; and 2) What groups constitute “Americans?” Understand that these are two distinctly separate and important concepts that form the undercurrents of Muslim-American radicalization. During the early years of the republic, the mainstream view was that America was to be a place where distinct groups could retain their individual identity while simultaneously assimilating and submitting to the idea that is America: Acknowledging that the protection of the Constitution and the principles enshrined therein is the only obligation of an American citizen. However, the unique irony is that the American mainstream has always maintained a working level of cultural ignorance of its ethnic minority groups, and whereby the racial majority categorized and separated “us” from “them.” Recognize that throughout most of American history, an “American” was categorized as only those people of English origin, or those who were Protestant, or white or hailed from northern Europe. But at this juncture in our history, we must recognize that the American mainstream is being pushed and pulled by a variety of factors such as immigrant populations (in this country legally or otherwise) who refuse to culturally assimilate and agitate ethnonationalist sentiment. This psycho-cultural conflict has forced the American public consciousness into default mode. As mainstream America continues to become suspicious of Muslim-Americans and vice versa, the “Us versus Them” construct, based on existing racial paradigms, will be categorized in two ways: 1) White/African-Americans (“Us”) versus Muslim-Americans (“Them”); and 2) White Americans (“Us”) versus African-Americans (“Us”) versus “Muslim-Americans” (“Us”). What is absolute of the “Us versus Them” construct is that it results in alienation that breeds resentment which, in turn, manifests into political radicalization. Terror Adv – Informants Key FBI Surveillance of Muslim communities distrupts trust making counter terror efforts impossible Currier 15 ( Cora Currier is a journalist with a focus on national security, foreign affairs, and human rights. As a reporting fellow at ProPublica, she covered national security and finance, 1/21/15, “ SPIES AMONG US: HOW COMMUNITY OUTREACH PROGRAMS TO MUSLIMS BLUR LINES BETWEEN OUTREACH AND INTELLIGENCE”, The Intercept, https://firstlook.org/theintercept/2015/01/21/spies-among-us-community-outreach-programsmuslims-blur-lines-outreach-intelligence/, 7/8/15, HDA) Last May, after getting a ride to school with his dad, 18-year-old Abdullahi Yusuf absconded to the Minneapolis-St. Paul airport to board a flight to Turkey. There, FBI agents stopped Yusuf and later charged him with conspiracy to provide material support to a foreign terrorist organization—he was allegedly associated with another Minnesota man believed to have gone to fight for the Islamic State in Syria. To keep other youth from following Yusuf’s path, U.S. Attorney Andrew Luger recently said that the federal government would be launching a new initiative to work with Islamic community groups and promote after-school programs and job training–to address the “root causes” of extremist groups’ appeal. “This is not about gathering intelligence, it’s not about expanding surveillance or any of the things that some people want to claim it is,” Luger said. Luger’s comments spoke to the concerns of civil liberties advocates, who believe that blurring the line between engagement and intelligence gathering could end up with the monitoring of innocent individuals. If past programs in this area are any guide, those concerns are well founded. Documents obtained by attorneys at the Brennan Center for Justice at New York University School of Law, and shared with the Intercept, show that previous community outreach efforts in Minnesota–launched in 2009 in response to the threat of young Americans joining the al-Qaeda-linked militia al-Shabab, in Somalia—were, in fact, conceived to gather intelligence. A grant proposal from the St. Paul Police Department to the Justice Department, which the Brennan Center obtained through a Freedom of Information Act request to the FBI, lays out a plan in which Somali-speaking advocates would hold outreach meetings with community groups and direct people toward the Police Athletic League and programs at the YWCA. The proposal says that “the team will also identify radicalized individuals, gang members, and violent offenders who refuse to cooperate with our efforts.” “It’s startling how explicit it was – ‘You don’t want to join the Police Athletic League? You sound like you might join al-Shabab!’” said Michael Price, an attorney with the Brennan Center. *** The Islamic State may be the new face of religious extremism, but for a number of years, law enforcement in St. Paul and Minneapolis have had to contend with the appeal of al-Shabab to members of the country’s largest Somali population—more than 20 young men have reportedly left Minnesota to fight with the group since 2007. Dennis Jensen, St. Paul’s former assistant police chief, had spent years studying relations between police and the city’s Somali community, which is largely composed of recent immigrants from a war zone who have little reason to trust the authorities. But the al-Shabab threat galvanized the Department to see their work as a frontline for counterterrorism. Jensen told the Center for Homeland Defense and Security in 2009 that extremist recruitment added “a greater sense of urgency about what we are doing,” he said. “We’re up front about what our intentions are. It’s not a secret we’re interested in radicalized individuals.” (Jensen did not respond to emailed questions from the Intercept.) Jensen helped design a new program for St. Paul–a two-year initiative called the African Immigrant Muslim Coordinated Outreach Program, which was funded in 2009 with a $670,000 grant from the Justice Department. The outreach push would help police identify gang members or extremists, using “criteria that will stand up to public and legal scrutiny,” according to the proposal submitted to the Justice Department. “The effort of identifying the targets will increase law enforcement’s ability to maintain up-to-date intelligence on these offenders, alert team members to persons who are deserving of additional investigative efforts and will serve as an enhanced intelligence system,” the proposal reads. The Center for Homeland Defense and Security, in the 2009 interview with Jensen, characterized it as “developing databases to track at-risk youth who may warrant follow-up contact and investigation by law enforcement.” Asad Zaman, executive director of the Muslim American Society of Minnesota, said that his organization got funding through the program to hire a police liaison. They held meetings once or twice a month for two years, usually involving 20 or so community members and a few local cops. “The officers talked about drug enforcement and gangs and recruitment and domestic violence. Everyone loved it when they brought their bomb-sniffing robot once,” he recalled. He said he was not told about an intelligence component, though he had been asked to keep track of attendees at outreach meetings. “Several times [the police department] asked me whether that was possible to turn over the list of people at the programs, and I said, ‘It ain’t gonna happen,’” Zaman said. Steve Linders, a St. Paul Police spokesman, said that “the intelligence aspect never came to fruition. The program evolved away from that.” He said that they would sometimes pass information that community members brought to their attention to the FBI, but that was the extent of the bureau’s involvement. Linders said that people were not required to sign in to outreach meetings and there was no list of people who refused to participate, as originally proposed. “It was a conscious decision,” not to follow the plan laid out in the grant application, Linders said. “We frankly got more out of the program when we viewed it more as a way to get [community groups] resources and get their trust and partnership,” he said. For the Brennan Center’s Price, the shifting description just underlines how such programs can mislead the public. “I’m glad to hear they appear to have had a change of heart,” he said, “but it would be in everybody’s interest to clarify at the outset that they are collecting information for intelligence purposes, or that they are not.” The program “still raises questions for me,” Price added. “What led them to at first propose intelligence gathering, and then do an about face?” *** Around the same time that St. Paul developed its program, the FBI was leading a parallel push to leverage community outreach for intelligence. In 2009, it launched “Specialized Community Outreach Teams,” which would “strategically expand outreach to the Somali community to address counterterrorism-related issues” in Minneapolis and several other cities around the country. Then-FBI director Robert Mueller described the teams as part of an effort “to develop trust, address concerns, and dispel myths” about the FBI. In an internal memo obtained by the Brennan Center, however, the teams were called a “paradigm shift,” allowing “FBI outreach to support operational programs.” The co-mingling of intelligence and outreach missions would appear to run afoul of the FBI’s own guidelines for community engagement, the 2013 version of which state that officers must maintain “appropriate separation of operational and outreach efforts.” The FBI would not say if the “Specialized Community Outreach Teams” (which have ended) would be allowed under the new guidance, though in a statement, the FBI said the guidance “does not restrict coordination with operational divisions to obtain a better understanding of the various violations (i.e. terrorism, drugs, human trafficking, white collar crime, etc.) which may be impacting communities.” “If the guidance would allow this program to continue, then it just confirms that it’s full of loopholes,” said Price, of the Brennan Center. This isn’t the first FBI outreach program to raise these concerns. The American Civil Liberties Union has documented cases in recent years in San Francisco and San Jose where federal agents visited mosques and attended Ramadan dinners in the name of outreach, all the while keeping records on the participants. Some of the programs were well-meaning attempts at educating Islamic leaders about the threat of hate crimes, but nonetheless ended up collecting private information, according to Mike German, a former FBI agent who worked on this issue for the ACLU (he is now also with the Brennan Center). In other cases, “FBI agents were going out with outreach officers or mimicking community outreach to exploit it for intelligence purposes,” he said. Lori Saroya, until recently executive director of the Council on American-Islamic Relations Minnesota, said that people weren’t always aware of their rights when faced with outreach visits. “We had cases of people inviting FBI agents in for tea or to have dinner, not knowing they didn’t have to let them in,” she said. It’s this precedent that gives pause to critics of a new White House initiative to “counter violent extremism.” Though it is ostensibly aimed at extremists of all stripes, the outreach push has largely framed the involvement of Islamic community groups as key to helping authorities “disrupt homegrown terrorists, and to apprehend would-be violent extremists,” in Attorney General Eric Holder’s words. Luger’s plan for the Minneapolis area is part of this initiative, run jointly between the Justice Department, National Counterterrorism Center, and the Department of Homeland Security. Los Angeles and Boston are the other pilot cities. Details about the undertaking are still vague, though the attacks in Paris this month refocused attention on the issue, and the White House abruptly scheduled a summit on the topic for February (it was postponed last fall, without explanation.) German is doubtful about the prospects. “Countering violent extremism” is a relatively young science, and he points to studies that have failed to identify predictable indicators of what makes someone decide to commit ideologically motivated violence. Pumping resources into underserved communities is great, says German, but some of these programs may end up just alienating the communities they are intended to work with. “It suggests that the entire community is a threat, or a potential threat, and something to be managed,” he said. Target Surveillance of Muslim groups strains trust with authorities – makes counter terror impossible Patel and Price 12 (Faiza Patel is Co-Director of the Liberty and National Security Programme at the Brennan Centre for Justice. She is also a member of the United Nations Human Rights Council's Working Group on the Use of Mercenaries. Michael Price is Counsel of the Liberty and National Security Programme at the Brennan Centre for Justice. He was the National Security Coordinator for the National Association of Criminal Defense Lawyers, 4/12/12, Aljazeera, Surveillance of American Muslims: A tale of three cities, http://www.aljazeera.com/indepth/opinion/2012/04/201241061612704789.html, 7/8/15, HDA) The flood of reports about the New York City Police Department's surveillance of American Muslims - in mosques, restaurants, bookstores and even elementary schools in New York, New Jersey, New Orleans and beyond - has triggered a range of responses around the country. Mayor Michael Bloomberg and Police Commissioner Ray Kelly have defended the programme, suggesting that such wholesale surveillance of Muslims is necessary to keep the City safe. The NYPD certainly has a formidable task and has protected New Yorkers through times of high alert. But the reactions of public officials in cities such as Los Angeles and Chicago, which have also faced serious terrorist threats, suggest that effective counterterrorism does not require such a stark choice between our liberty and our safety. Honest efforts to build partnerships with American Muslim communities present an alternative approach to terrorism that has proven to be both successful and respectful of our Constitutional values. New York City is understandably sensitive to terrorism concerns. As both Mayor Bloomberg and Commissioner Kelly have repeatedly acknowledged, keeping New York safe requires the police to build trust with American Muslim communities who may be best positioned to provide information necessary to avert a terrorist plot. Indeed, studies show that up to 40 per cent of the tips that have been used to stop terrorists have come from American Muslims. But the NYPD's decision to monitor Muslim communities solely on the basis of their religion is not conducive to building relationships of trust. The fraying of the fragile relationship between the police and Muslim New Yorkers has been vividly on display since reports of these programmes first emerged, with several Muslim leaders boycotting the Mayor's annual interfaith breakfast, declining meetings with the Police Commissioner and staging repeated protests outside City Hall. These connections are vital not only to counterterrorism efforts, but also to ensure that Muslim communities feel comfortable enough communicating with local police to help solve everyday crimes. Decades of research show that perceptions of police legitimacy influence the willingness of communities to co-operate with officers. The FBI, which has faced its own challenges with respect to its treatment of Muslim communities, has publicly criticised the NYPD's approach because it has strained relations with American Muslims who have generally "embraced" law enforcement's counterterrorism mission. NYPD's approach Public officials in other cities have rushed to distance themselves from the NYPD's approach. In Chicago, Mayor Rahm Emanuel said the city would never permit its officers to spy on Muslim communities as the NYPD has done, promising: "We don't do that in Chicago and we're not going to do that". As reports emerged that the NYPD had spied on Muslim neighbourhoods in Newark, New Jersey, the Chicago Police Department, now run by the former head of the Newark Police Department, quickly issued an order prohibiting "bias based policing". In Los Angeles, the Deputy Chief of the Police Department, Michael Downing, stressed that his department considered the Muslim community a key partner in fighting terrorism. In his view: "There is no reason for us to survey Muslim students or where people buy their meat; that is not suspicious to us. That is how someone lives their life." Indeed, in 2007, the LAPD considered and rejected a New York-style plan to "map" Muslim communities because of concerted opposition from both Muslim and civil rights groups. But the difference between these police departments is not just one of attitude towards American Muslim communities. Los Angeles and Chicago conduct their counterterrorism work primarily in partnership with the FBI. The NYPD, however, houses a stand-alone counterterrorism and intelligence operation that costs taxpayers more than $100 million a year and employs 1,000 officers. But unlike the FBI, which is overseen by an Inspector General reporting to Congress, the NYPD's intelligence operation is conducted without any meaningful oversight. If the NYPD insists on modelling itself as a mini-FBI, then it should be subject to the same level of oversight - an independent Inspector General. New Yorkers are grateful to the NYPD for its work in protecting the city. However, our nation's historical commitment to civil liberties and religious tolerance must not be brushed aside by talismanic claims of national security. An Inspector General could bring greater transparency to the murky world of intelligence gathering, serving as an honest broker to determine whether NYPD programmes comply with the law. By developing and sharing credible information that would allow both our elected leaders and New Yorkers to better evaluate police programmes, the Inspector General could help break the current cycle of accusations and denials. And such transparency would help restore the badly battered trust between the NYPD and minority communities and lead to a stronger, more effective police force. Let us not forget that all Americans - Muslims, Jews, Christians, Buddhists, Hindus and atheists alike - are committed to the security of our country and our country will be safest when we all work together towards this goal. A report that the U.S. government conducted electronic surveillance on five prominent Muslim Americans is troubling. It deserves a fuller response from the government than a boilerplate assurance that it doesn't choose targets of surveillance based on their political or religious views. The notion that the FBI would target innocent individuals because of their views isn't fantastic in light of the agency's past activities. Relying on a spreadsheet supplied by former National Security Agency contract worker Edward Snowden, the online news site Intercept reported that, between 2006 and 2008, the government tracked the email accounts of Faisal Gill, who had served in the U.S. Department of Homeland Security, and four other men, including Nihad Awad, executive director of the Council on American-Islamic Relations, this country's largest Muslim civil rights organization. The article suggested that the men might have been targeted for surveillance because of their religion or peaceful advocacy, although no evidence of that was given. It noted that all of the men deny involvement in terrorism. None has been charged with a crime arising from the surveillance. The article also quotes a former FBI counter-terrorism official as spinning outlandish theories about Muslim Brotherhood infiltration of the United States, and it refers to a directive for intelligence personnel that used "Mohammed Raghead" as the name of a hypothetical surveillance target. It isn't clear whether any or all of the men were subjected to surveillance under the provisions of the Foreign Intelligence Surveillance Act. That 1978 law requires the government to demonstrate to a special court that there is probable cause that an American citizen or permanent resident is an agent of a foreign power or terrorist organization. (It's possible that there can be probable cause to subject someone to surveillance for foreign intelligence purposes without there being probable cause to charge him with a crime.) The notion that the FBI would target innocent individuals because of their views isn't fantastic in light of the agency's past activities, and profiling of Muslims was an unfortunate aspect of the official reaction to 9/11. That doesn't mean that the past is prologue in this case and that these five men were the victims of religious bias, but the suspicion is understandable. The American Civil Liberties Union and several other organizations have called on President Obama to make a "full public accounting" of the government's surveillance practices. It's unrealistic to expect the administration to publicize classified information in specific cases, but the FBI's inspector general should inquire into the circumstances of these investigations and any broader role that religious stereotyping might be playing in the selection of targets for surveillance. FBI targeted Surveillance of Muslims alienates Muslim communities who are key for counter-terrorism efforts CAIR 12 (The Council on American-Islamic Relations (CAIR) is a grassroots civil rights and advocacy group and CAIR America's largest Muslim civil liberties organization, with regional offices nationwide, 10/1/12, “FBI COUNTER TERRORISM MEASURES CREATING MISTRUST IN AMERICAN MUSLIM COMMUNITIES, CAIR Chicago, http://www.cairchicago.org/blog/2012/10/fbicounter-terrorism-measures-creating-mistrust-in-american-muslim-communities, 7/8/15, HDA) Since the September 11th, 2001 attacks, the FBI has placed an emphasis on preventing further terrorist attacks on U.S. soil. To do so, they have focused their energy on preemptive measures, seeking to discover terrorists before their dreams of destruction can be realized. However, this effort has not been without controversy, as many of the “terrorists” claim foul play and entrapment. These accusations refer to the FBI’s strategy of placing informants within specific communities, in particular the American Muslim community, and having them seek out radical elements for further “assessment.” Recently, the FBI appears to have conducted blanket surveillance of broad sections of the American Muslim community, leading to a number of foiled terrorist plots. However, a closer look into some of these foiled terrorist attempts reveals that the planning, materials, funding, and even transportation for these attacks have almost all been provided to these disgruntled young men by the FBI themselves. This raises a very serious question: Would these young men still pose a terrorist threat to the U.S. had the FBI not engaged them, and even provided them with all the resources necessary to commit these acts of violence? Though the legal definition of entrapment makes it hard to clearly define these cases as such, the methods used by the FBI in recent years create an impression of racial profiling on a scale reminiscent of the oppression of Japanese Americans during the Second World War. Apparently, the FBI feels that American Muslims are guilty by association until proven innocent through extensive, and extremely intrusive, surveillance campaigns. In an article published by The Guardian (UK), Paul Harris interviewed former FBI informant Craig Monteilh, who gave an inside account of the FBI’s domestic counter terrorism efforts. Monteilh, having been an integral part of the hunt for Muslim terrorists, characterized the methods used by the FBI as “…a joke, a real joke. There is no real hunt. It’s fixed.” Monteilh began working for the FBI as a confidential informant in 2006, participating in an operation referred to as “Flex,” where he posed as a Syrian by the name of Farouk Aziz. By this alias, Monteilh was ordered to spend time in Orange County, California, mosques and Islamic centers until the Muslim community there became comfortable enough to accept him as a fellow member. From there he was tasked with recording any and all conversations he had with members of the community, subtly suggesting radical ideas to those he talked to in hopes of luring out more extreme members. According to Monteilh, the aim of his investigation was to record members saying specific words or phrases that could justify further investigations. “The skill is that I’m going to get you to say something. I am cornering you to say ‘jihad.’” But that’s not all Monteilh was tasked with doing. He even reports of being told to use private information about members of the Islamic community, such as individuals’ being homosexual or having an affair, as blackmail in order to recruit more informants. In one case he was even told to have sex with women of the community in order to get closer to them. And despite his best efforts to “corner” members into saying the “right” words, or using their religious stigmas towards sexuality against them, Monteilh was unsuccessful in producing any material initiating a serious terrorist investigation. In fact, one of the communities that he was attempting to infiltrate got a restraining order against him and even reported him to the FBI, unaware that he was actually working for them. Surely, however, this is an isolated incident of misconduct…this couldn’t happen in a nation that respects the constitutionally protected civil liberties of ALL its citizens. I wish I could say that was the truth. According to an article written for The New York Times, of the 22 most frightening foiled terrorist plots since the September 11th, 2001 attacks, 14 have been the products of operations very similar to that described by Monteilh. In 2009, four men were arrested in Newburgh, New Jersey, for planning to bomb Jewish synagogues and shoot down military aircraft with Stinger anti-aircraft missiles. Referred to as the Newburgh Four, and portrayed as hardcore “Islamic extremists,” these men were all convicted and sentenced to lengthy jail terms. But after reviewing the case, it is hard not to notice that the profiles of these four men didn’t fit those of hardened terrorist masterminds. Rather, their lives were characterized by drug and financial problems, criminal histories (for petty crimes), and in one case schizophrenia. Furthermore, the fifth man involved in this plot, the one who provided the plans, weapons, transportation, and an offer of $250,000, a free car and vacation to the others, was none other than a well-paid FBI informant. This case has raised serious doubt as to whether these four men would have posed any sort of threat had they not been approached by an FBI agent who offered to pay large sums of money for their cooperation. Considering that one of the four, David Williams, was having trouble raising the money to pay for a much needed liver transplant for his sick brother, these men look more like paid thugs than terrorist masterminds. Susanne Brody, an attorney representing one of the four, claimed that “We have as close to a legal entrapment case as I have ever seen.” Unfortunately, the list of cases nearly identical to these goes on, from the Liberty City Six, whose plans never surpassed the discussion stage, to the Fort Dix Five, where one FBI informant’s past included attempted murder and another admitted in court that two of the men convicted were never aware of any terrorist plot (both were sentenced to life in prison). According to Mike German, a former FBI agent now working for the ACLU, “Most of these terrorist suspects had no access to weapons unless the government provided them. I would say that showed they were not the biggest threat to the U.S.” According to German, the FBI has been expanding its tools for carrying out such investigations, something he considers a “terrible prospect.” But are the tools used in these cases legitimate, even by the FBI’s own standards? According to the Domestic Investigations and Operations Guide (DIOG – FBI, 2008), these tactics are questionable at best. Section four of the DIOG, entitled “[O]n Privacy and Civil Liberties, and ‘Least Intrusive Methods,’” it states that each investigation must have a clearly defined and approved purpose and that this purpose is prohibited from being “based solely on race, ethnicity, national origin or religion.” What’s more telling is, in section 4.2 B, on the exercise of religion, the DIOG states that, …solely because prior subjects of an investigation of a particular group were members of a certain religion and they claimed a religious motivation for their acts of crime or terrorism, other members’ mere affiliation with that religion, by itself, is not a basis to assess or investigate – absent a known and direct connection to the threat under assessment or investigation. However, the blanket surveillance of Muslim communities in California described by Monteilh, and the recently uncovered case of NYPD eavesdropping on the entire New York Muslim community, seem to clearly violate these regulations. It has recently become ever clearer that many of these investigations have been initiated solely because these communities happen to be Muslim, with no prior evidence of suspicious behavior whatsoever. Assistant Chief Thomas Galati, head of NYPD’s secret Demographics Unit charged with this task, admitted that after nearly six years of monitoring the Muslim community in New York they were unable to come up with a single investigation. But it doesn’t stop there. The DIOG (Domestic Investigations and Operations Guide) places a heavy emphasis on the protection of First Amendment rights, stating that no investigations can be initiated based solely in response to ones expression of these rights, or solely to monitor their expression of them. Of course, however, freedom of speech in the United States does not protect all language. The DIOG refers to a U.S. Supreme Court ruling, Brandenburg v. Ohio (1969), where the court ruled that the government may not prohibit the advocacy of force or violence except when such activity is intended to provoke imminent (emphasis added by DIOG) lawless activity, and is likely to do so. However, according to the testimony given by Monteilh, using the word “jihad” (which has two meanings, the main meaning having nothing to do with “holy war”) was enough to initiate an investigation. But simply using the word “jihad” does not provoke imminent lawless behavior; therefore, being protected under the First Amendment rights that the FBI is prohibited from using as their sole justification for initiating an investigation. The blanket recording of conversations with members of the Muslim community, all of whom had said absolutely nothing to provoke imminent lawless behavior, is a clear violation of both DIOG regulations and the Brandenburg (1969) ruling. Lastly, the DIOG also mandates the use of the least intrusive methods possible for conducting intelligence gathering operations and lists the use of wiretaps, electronic surveillance, and informants as “very intrusive.” The fact that the FBI has chosen to use such methods, especially on populations and individuals that have presented no prior evidence of wrongdoing, suggests that this regulation means little to the Bureau. Though the FBI has played a significant role in keeping America safe from further terrorist attacks, it also seems clear that some of their efforts have been severely misguided, even jeopardizing their ability to do the best job possible. The fact that Monteilh was reported to the FBI by the very community he was trying to infiltrate, suggests that these investigations are an unwarranted waste of valuable resources; and one of the most valuable resources in the counter terrorism efforts of the FBI, according to the DIOG, is “the trust and confidence of the American public.” Ironically, the very next statement in the DIOG is, “…and because that trust and confidence can be significantly shaken by our failure to respect the limits of our power, special care must be taken by all employees to comply with these limitations.” However, many experts agree that the FBI’s recent conduct regarding such cases has created an atmosphere of distrust within the American Muslim community. According to civil rights groups, American Muslims feel as if they are being unjustly targeted by the authorities for investigations simply because of their faith, “triggering a natural fear of the authorities among people that should be a vital defense against real terror attacks.” Instead of alienating the Muslim population, whose cooperation is essential to counter terrorism efforts, the FBI should push itself to comply with their own procedures and legal precedent established by the nation’s highest court, and focus their energy on investigating proven threats to society. This would help to rebuild the trust of the American Muslim community, as well as put pressure on the individuals that actually intend to do harm. Government Islamophobia and Surveillance harm crucial counterterrorism relations Al-Marayati 11 (Salam Al-Marayati is executive director of the Muslim Public Affairs Council, an American institution which informs and shapes public opinion and policy by serving as a trusted resource to decision makers in government, media and policy institutions, 10/19/12, Las Angeles Times, The wrong way to fight terrorism, http://articles.latimes.com/2011/oct/19/opinion/la-oe-almarayati-fbi-20111019, 7/8/15, HDA) We in the Muslim American community have been battling the corrupt and bankrupt ideas of cults such as Al Qaeda. Now it seems we also have to battle pseudo-experts in the FBI and the Department of Justice. A disturbing string of training material used by the FBI and a U.S. attorney's office came to light beginning in late July that reveals a deep anti-Muslim sentiment within the U.S. government. If this matter is not immediately addressed, it will undermine the relationship between law enforcement and the Muslim American community — another example of the ineptitude and/or apathy undermining bridges built with care over decades. It is not enough to just call it a "very valid concern," as FBI Director Robert Mueller told a congressional committee this month. The training material in question provided to FBI agents at the academy in Quantico, Va. — as first reported by Wired magazine's Danger Room blog — contained bigoted and inflammatory views on Muslims, including claims that "devout" Muslims are more prone toward violence, that Islam aims to "transform a country's culture into 7th century Arabian ways," that Islamic charitable giving is a "funding mechanism for combat" and that the prophet Muhammad was a "violent cult leader." Wired also found a 2010 presentation by an analyst working for the U.S. attorney's office in Pennsylvania that warns of a " 'Civilizational Jihad' stretching back from the dawn of Islam and waged today in the U.S. by 'civilians, juries, lawyers, media, academia and charities' who threaten 'our values.' The goal of that war: 'Replacement of American Judeo-Christian and Western liberal social, political and religious foundations by Islam.'" Such baseless and inflammatory claims shall best be left to those few who share Al Qaeda's agenda of keeping America in a perpetual state of war with Islam. In other words, the rhetoric of Al Qaeda and these law enforcement trainers are opposite sides of the same coin of hate. If our law enforcement and intelligence agencies continue to use incorrect and divisive training literature, the crucial partnership between the Muslim American community and law enforcement will slowly disintegrate. According to the Muslim Public Affairs Council's Post-9/11 Terrorism Incident Database, these partnerships have proved effective in keeping our nation safe. Nearly 40% of Al Qaeda-related plots threatening the American homeland since 9/11 have been foiled thanks to tips from Muslims. One example of this is the so-called Virginia 5 case in 2009, in which information from the Muslim community in Virginia led to the arrest in Pakistan of five Muslims from Virginia who were trying to join an Al Qaeda group. Last year, in another case, members of a Maryland community warned law enforcement about Antonio Martinez, who had recently converted to Islam. He was subsequently arrested after he allegedly tried to blow up a military recruitment center. More important, Muslim leaders, not FBI agents, can more effectively battle Al Qaeda's destructive ideas. I have worked for more than 20 years with law enforcement and Muslim American communities, and one of the biggest consequences of these training sessions and use of this material is the setback of a vital relationship that required years to build. I know justifiable criticism can be levied against some Muslim leaders in America for not aggressively promoting civic engagement, for not being self-critical enough and for not distancing themselves from rabble-rousers. But how can we persuade Muslim American communities to stay at the table when the food on the table is filled with poison? These training manuals are making it more difficult for Muslim Americans to foster any trust with law enforcement agencies. Biased and faulty training leads to biased and faulty policing. The real challenge now is getting the partnership back on track, and for the FBI and the Justice Department to take the following steps: issue a clear and unequivocal apology to the Muslim American community; establish a thorough and transparent vetting process in selecting its trainers and materials; invite experts who have no animosity toward any religion to conduct training about any religious community to law enforcement. Finally, the White House needs to form an interagency task force that can conduct an independent review of FBI and Justice Department training material. The following words are etched into the walls of the FBI headquarters building in Washington: "The most effective weapon against crime is cooperation … of all law enforcement agencies with the support and understanding of the American people." Atty. Gen. Eric H. Holder Jr. and FBI Director Mueller, take some leadership on this matter, or the partnership we've built to counter violent extremism will forever be handicapped. The question you have to answer is simple: Are we on the same team or not? FBI sting operations have destroyed relations with Muslims communities- only stopping this targeting with build trust to help counter-terrorism effort HRW 14 (The Human Rights Watch is a nonprofit, nongovernmental human rights organization made up of roughly 400 staff members around the globe. Its staff consists of human rights professionals including country experts, lawyers, journalists, and academics of diverse backgrounds and nationalities. Established in 1978, Human Rights Watch is known for its accurate fact-finding, impartial reporting, effective use of media, and targeted advocacy, often in partnership with local human rights groups, 7/21/14, HRW, “US: Terrorism Prosecutions Often An Illusion”, https://www.hrw.org/news/2014/07/21/us-terrorism-prosecutions-oftenillusion, 7/8/15, HDA) The US Justice Department and the Federal Bureau of Investigation (FBI) have targeted American Muslims in abusive counterterrorism “sting operations” based on religious and ethnic identity, Human Rights Watch and Columbia Law School’s Human Rights Institute said in a report released today. Many of the more than 500 terrorism-related cases prosecuted in US federal courts since September 11, 2001, have alienated the very communities that can help prevent terrorist crimes. The 214-page report, “Illusion of Justice: Human Rights Abuses in US Terrorism Prosecutions,” examines 27 federal terrorism cases from initiation of the investigations to sentencing and post-conviction conditions of confinement. It documents the significant human cost of certain counterterrorism practices, such as overly aggressive sting operations and unnecessarily restrictive conditions of confinement. “Americans have been told that their government is keeping them safe by preventing and prosecuting terrorism inside the US,” said Andrea Prasow, deputy Washington director at Human Rights Watch and one of the authors of the report. “But take a closer look and you realize that many of these people would never have committed a crime if not for law enforcement encouraging, pressuring, and sometimes paying them to commit terrorist acts.” Many prosecutions have properly targeted individuals engaged in planning or financing terror attacks, the groups found. But many others have targeted people who do not appear to have been involved in terrorist plotting or financing at the time the government began to investigate them. And many of the cases involve due process violations and abusive conditions of confinement that have resulted in excessively long prison sentences. The report is based on more than 215 interviews with people charged with or convicted of terrorism-related crimes, members of their families and their communities, criminal defense attorneys, judges, current and former federal prosecutors, government officials, academics, and other experts. In some cases the FBI may have created terrorists out of law-abiding individuals by suggesting the idea of taking terrorist action or encouraging the target to act. Multiple studies have found that nearly 50 percent of the federal counterterrorism convictions since September 11, 2001, resulted from informant-based cases. Almost 30 percent were sting operations in which the informant played an active role in the underlying plot. In the case of the “Newburgh Four,” for example, who were accused of planning to blow up synagogues and attack a US military base, a judge said the government “came up with the crime, provided the means, and removed all relevant obstacles,” and had, in the process, made a terrorist out of a man “whose buffoonery is positively Shakespearean in scope.” The FBI often targeted particularly vulnerable people, including those with intellectual and mental disabilities and the indigent. The government, often acting through informants, then actively developed the plot, persuading and sometimes pressuring the targets to participate, and provided the resources to carry it out. “The US government should stop treating American Muslims as terrorists-in-waiting,” Prasow said. “The bar on entrapment in US law is so high that it’s almost impossible for a terrorism suspect to prove. Add that to law enforcement preying on the particularly vulnerable, such as those with mental or intellectual disabilities, and the very poor, and you have a recipe for rampant human rights abuses.” Rezwan Ferdaus, for example, pled guilty to attempting to blow up a federal building and was sentenced to 17 years in prison. Although an FBI agent even told Ferdaus’ father that his son “obviously” had mental health problems, the FBI targeted him for a sting operation, sending an informant into Ferdaus’ mosque. Together, the FBI informant and Ferdaus devised a plan to attack the Pentagon and US Capitol, with the FBI providing fake weaponry and funding Ferdaus’ travel. Yet Ferdaus was mentally and physically deteriorating as the fake plot unfolded, suffering depression and seizures so bad his father quit his job to care for him. The US has also made overly broad use of material support charges, punishing behavior that did not demonstrate an intent to support terrorism. The courts have accepted prosecutorial tactics that may violate fair trial rights, such as introducing evidence obtained by coercion, classified evidence that cannot be fairly contested, and inflammatory evidence about terrorism in which defendants played no part – and asserting government secrecy claims to limit challenges to surveillance warrants. Ahmed Omar Abu Ali is a US citizen who alleged that he was whipped and threatened with amputation while detained without charge in Saudi Arabia – after a roundup following the 2003 bombings of Western compounds in the Saudi capital of Riyadh – until he provided a confession to Saudi interrogators that he says was false. Later, when Ali went to trial in Virginia, the judge rejected Ali’s claims of torture and admitted his confession into evidence. He was convicted of conspiracy, providing material support to terrorists, and conspiracy to assassinate the president. He received a life sentence, which he is serving in solitary confinement at the federal supermax prison in Florence, Colorado. The US has in terrorism cases used harsh and at times abusive conditions of confinement, which often appear excessive in relation to the security risk posed. This includes prolonged solitary confinement and severe restrictions on communicating in pretrial detention, possibly impeding defendants’ ability to assist in their own defense and contributing to their decisions to plead guilty. Judges have imposed excessively lengthy sentences, and some prisoners suffer draconian conditions post-conviction, including prolonged solitary confinement and severe restrictions on contact with families or others, sometimes without explanation or recourse. Nine months after his arrest on charges of material support for terrorism and while he was refusing a plea deal, Uzair Paracha was moved to a harsh regime of solitary confinement. Special Administrative Measures (SAMs) – national security restrictions on his contact with others – permitted Paracha to speak only to prison guards. “You could spend days to weeks without uttering anything significant beyond ‘Please cut my lights,’ ‘Can I get a legal call/toilet paper/a razor,’ etc., or just thanking them for shutting our light,” he wrote to the report’s researchers. After he was convicted, the SAMs were modified to permit him to communicate with other inmates. “I faced the harshest part of the SAMs while I was innocent in the eyes of American law,” he wrote. These abuses have had an adverse impact on American Muslim communities. The government’s tactics to seek out terrorism suspects, at times before the target has demonstrated any intention to use violence, has undercut parallel efforts to build relationships with American Muslim community leaders and groups that may be critical sources of information to prevent terrorist attacks. In some communities, these practices have deterred interaction with law enforcement. Some Muslim community members said that fears of government surveillance and informant infiltration have meant they must watch what they say, to whom, and how often they attend services. “Far from protecting Americans, including American Muslims, from the threat of terrorism, the policies documented in this report have diverted law enforcement from pursuing real threats,” Prasow said. “It is possible to protect people’s rights and also prosecute terrorists, which increases the chances of catching genuine criminals. Terror Adv – Radicalization Link NSA and FBI surveillance specifically targeted Arab-American communities. Further discriminatory surveillance risks key co-op, possible radicalization. Risen ‘14 (Internally quoting Vanda Felbab-Brown, a senior fellow on foreign policy at the Brookings Institution. Tom Risen is a reporter for U.S. News & World Report. “Racial Profiling Reported in NSA, FBI Surveillance” - U.S. News & World Report - July 9, 2014 - http://www.usnews.com/news/articles/2014/07/09/racial-profiling-reported-in-nsa-fbisurveillance) Congregants pray at a mosque in Paterson, New Jersey. The NSA and FBI reportedly spied on prominent Muslim Americans following the 9/11 attacks, according to a leaked government document. The National Security Agency and the FBI have reportedly been overzealous trying to prevent terrorist attacks to the point that anti-Islamic racism in those agencies led to the surveillance of prominent Muslim-Americans, revealing a culture of racial profiling and broad latitude for spying on U.S. citizens. An NSA document leaked by former agency contractor Edward Snowden to reporter Glenn Greenwald shows 202 Americans targeted among the approximately 7,485 email addresses monitored between 2002 and 2008, Greenwald’s news service The Intercept reports. [READ: Glenn Greenwald Suggests There's a Second NSA Leaker] To monitor Americans, government agencies must first make the case to the Foreign Intelligence Surveillance Court that there is probable cause that the targets are terrorist agents, foreign spies or “are or may be” abetting sabotage, espionage or terrorism. Despite this filter The Intercept identified five Muslim-Americans with high public profile including civil rights leaders, academics, lawyers and a political candidate. NSA Spied On U.S. Muslims Like ‘Hoover Did On MLK’ Daily Caller Racial profiling of Muslims by security officers has been a controversy since the terrorist attacks of 2001 spiked fears about al-Qaida trainees preparing more attacks. The New York Police Department has disbanded its unit that mapped New York’s Muslim communities that designated surveillance of mosques as “terrorism enterprise investigations” after pressure from the Justice Department about aggressive monitoring by police. A 2005 FBI memo about surveillance procedures featured in The Intercept story uses a fake name “Mohammed Raghead” for the agency staff exercise. This latest report about email surveillance of successful Muslim-Americans is akin to “McCarthyism” that fed paranoia about communist spies during the Cold War, says Reza Aslan, a professor at the University of California, Riverside. “The notion that these five upstanding American citizens, all of them prominent public individuals, represent a threat to the U.S. for no other reason than their religion is an embarrassment to the FBI and an affront to the constitution,” Aslan says. There is a risk of radicalization among citizens Americans, evidenced by some who have gone to fight jihads in Syria and Somalia, but mass shootings carried out by U.S. citizens of various racial backgrounds occurs much more often, says Vanda Felbab-Brown, a senior fellow on foreign policy at the Brookings Institution. Since 1982, there have been at least 70 mass shootings across the U.S. “We have seen very little domestic terrorism in the U.S.,” Felbab-Brown says. This lack of terrorism is due in part to the willingness of the Islamic community to cooperate with law enforcement to identify possible radical threats, out of gratitude that the U.S. is a stable, secure country compared with the Middle East, she says. [ALSO: Privacy Watchdog Says NSA Spying Legal, Effective] “That could go sour if law enforcement becomes too aggressive, too extreme,” she says. Terror Adv – Yes Nuclear Terror Threat exists, and terrorists have the capability and motivation Brill et al 15(Kenneth C. Brill is a former U.S. ambassador to the International Atomic Energy Agency (IAEA) and the founding director of the U.S. government’s National Counterproliferation Center. John H. Bernhard is a former Danish ambassador to the IAEA and the Organization for Security and Co-operation in Europe and a former legal adviser in the Danish Foreign Ministry. They are members of the Nuclear Security Governance Experts Group, “A Convention on Nuclear Security: A Needed Step Against Nuclear Terrorism,” 6/1/15, https://www.armscontrol.org/ACT/2015_06/Features/A-Convention-on-Nuclear-Security-ANeeded-Step-Against-Nuclear-Terrorism 7/8/15) Some wonder whether the threat of nuclear terrorism exists outside of novels and Hollywood action films. The administrations of President George W. Bush and Obama have made clear the threat is real. Other global leaders, including those from the other 52 countries that have participated in the nuclear security summits, have done the same. Successive U.S. directors of national intelligence have outlined the reality of the threat in testimony to Congress and in their national intelligence strategies. Yukiya Amano, the director-general of the International Atomic Energy Agency (IAEA), and his immediate predecessor, Mohamed ElBaradei, have described nuclear terrorism as a threat that needs urgent attention. A nuclear terrorist attack, particularly one involving fissionable materials, would produce devastating international political, economic, humanitarian, and environmental consequences. Expert studies have concluded that even a small nuclear explosion in a major city would immediately kill tens of thousands of people and cause even more deaths subsequently. The explosion would destroy infrastructure over a wide area, and radiation would make a larger area unusable for many years. The costs of attending to the human casualties, relocating large numbers of people, and undertaking new construction and the cleanup of land and buildings, combined with the costs arising from bankruptcies, trade dislocations, and the disruption of energy and other supplies, would most likely be in the trillions of dollars.[2] Terrorists also could make a device from radiological substances, which are used globally for medical, research, and industrial purposes. A radiological dispersal device, or “dirty bomb,” would produce fewer casualties, but could result in significant consequences and costs for health, infrastructure, and the environment. Such a device also could make many blocks in an urban area too contaminated for humans to work or live in without time-consuming remediation. This would be very expensive and very disruptive to people’s lives, the environment, and the economy. Terrorist use of any type of nuclear device would cross an important psychological threshold for the public, governments and terrorist groups themselves, taking questions of national and international security into uncharted waters. At least five terrorist groups, including al Qaeda and the Islamic State, have demonstrated an interest in acquiring and using nuclear material or a nuclear weapon. Terrorists do not need to steal a nuclear weapon. An improvised nuclear device, which would have the explosive power comparable to the weapons used in Hiroshima and Nagasaki, can be made from highly enriched uranium or plutonium being used for civilian purposes. The Islamic State indicated its interest in nuclear terrorism with a boast about constructing a dirty bomb after stealing 88 pounds of unenriched uranium compounds from a university laboratory when it overran Mosul, Iraq, in 2014.[3] The continued loss, theft, and illegal movement of nuclear and other radioactive materials demonstrate that material is available for terrorists to acquire and use as a weapon. Since 1993, the IAEA has logged some 2,500 cases related to the theft, loss of control, unauthorized possession, or illicit trafficking of nuclear and other radioactive material.[4] The insecurity of nuclear and other radioactive material continues, with some 150 cases of theft, loss of control, or illicit trafficking reported annually. At least 18 cases of confirmed thefts or loss of weapons-usable nuclear material have occurred, the latest in 2011. The growing global demand for nuclear energy for power production and industrial, medical, and research uses means there will be an increasing amount of nuclear material in a growing number of countries that needs to be secured in the future. The impact of a terrorist nuclear explosion would be felt far beyond the city and country where it occurred. The entire global community would be affected, particularly those least able to afford it. In a 2005 speech, UN Secretary-General Kofi Annan said an act of nuclear terrorism “would stagger the world economy and thrust tens of millions of people into dire poverty” and create “a second death toll throughout the developing world.”[5] Other likely impacts would be an enhanced focus on security to prevent future nuclear attacks. This would affect international trade and investment, development assistance, and quite possibly domestic and international systems of governance. For all these reasons, nuclear terrorism must be prevented, as no response could undo the pervasive damage an incident would inflict on individuals, societies, and global approaches to governance and security. Convergence of three factors: loose nukes, new nukes, and new nuclear states, makes nuclear terrorism likely Schwartz 15 (Benjamin Schwartz, served in a variety of national security positions within the United States government, including in the Department of State, Department of Defense, and Department of Energy, Jan 22, 2015, “Right of Boom: The Aftermath of Nuclear Terrorism” https://books.google.com/books?hl=en&lr=&id=kx90BQAAQBAJ&oi=fnd&pg=PT16&dq=%22nuc lear+terrorism%22+&ots=0eodK81fLB&sig=Udz6i4kLUHb3hE66PGweV9zgBSg#v=onepage&q=% 22plausible%20deniability%22&f=false 7/8/2015 ZEC) Over seventy years has passed since the dawn of the nuclear age without a nuclear shot fired in anger. In that time, the world's nuclear powers have built enough atomic bombs to destroy the planet many times over. It is no exaggeration to describe this arms race as humankind approaching the edge of a nuclear abyss, staring down at Armageddon and slowly stepping back. Today the historical record makes clear that a minor miscalculation during the 1962 Cuban Missile Crisis would have sparked a war with casualties in the hundreds of millions.' Not only was atomic warfare avoided during those fourteen days in October 1962 and during the subsequent decades of the Cold War, but today an apocalyptic scenario involving the exchange of multikiloton warheads is extremely unlikely. This accomplishment is a testament to the wisdom of world leaders and the effectiveness of the modern state, though surely some credit is due to divine providence, fate, or extraordinary good luck. Yet just as this nuclear threat was receding another gradually emerged. Today, the risk of a single atomic bomb detonating in a city like Dubai, New York, Singapore, or Washington, DC, is higher than at any point in history. Why? Because the diffusion of nuclear weapons designs, materials, and know-how mean that it is or soon will be plausible for malign actors to conduct a clandestine nuclear attack with limited or no attribution. In 2004, Graham Allison warned that the chance of this type of attack taking place would be somewhere between "inevitable" and "highly likely" unless three conditions, which he referred to as the "Three No's," were met: (1) "no loose nukes." meaning vulnerable nuclear weapons and/or fissile material; (2) "no new nascent nukes," which means no new national capabilities to enrich uranium or reprocess plutonium; and (3) "no new nuclear weapons states." Unfortunately, ten years have passed and in that time each of the three conditions has been violated. The impacts of nuclear terrorism go beyond the initial loss of the detonationi.e. infrastructure damage and its impact on the economy, radiation, etc. Trimble 15 (David Trimble, serves as a Director in the U.S. Government Accountability Office’s Natural Resources & Environment group in Washington DC. Mr. Trimble provides leadership and oversight on Nuclear Security, Safety, and Nonproliferation issues. Mr. Trimble has also led GAO’s work on EPA management and environmental issues such as climate change, hydraulic fracturing, toxic chemicals, and water and air regulations , 2015, “GAO: Two Decades Evaluating the Impact and Effectiveness of U.S. Nuclear and Radiological Material Security Programs” from “Nuclear Threats and Security Challenges” pg. 4 7/8/2015 ZEC) One of the most serious threats facing the United States and other countries is the possibility that other nations or terrorist organizations could steal a nuclear warhead or nuclear weaponusable materials from poorly secured stockpiles around the world. or that nations could divert nuclear material intended for peaceful purposes to the development of nuclear weapons.' Of great concern is that terrorists could fashion a crude nuclear bomb made from either highly enriched uranium (HEU) or plutonium into an improvised nuclear device. Such a device would create an explosion producing extreme heat. powerful shockwaves and intense radiation that would be immediately lethal to individuals within miles of the explosion. as well as radioactive fallout over thousands of square miles. Nonproliferation experts estimate that a successful improvised nuclear device could devastate the heart of a medium- sized U.S. city and could cause hundreds of thousands of deaths and injuries. as well as pose long-term cancer risks to those exposed to the radioactive fallout. Radiological material also poses a significant security threat to the United States and the international community. Radiological material-such as cobalt-60. cesium- I37, and iridium-l92-is encapsulated or sealed in metal to prevent its dispersal and is commonly called a sealed radiological source. Sealed radiological sources are used worldwide for many legitimate purposes. such as medical. industrial. and agricultural applications. The total number of these sources in use worldwide is unknown because many countries do not systematically account for them. If certain types of these sources were obtained by terrorists. they could be used to produce a simple and crude but potentially dangerous weapon-known as a radiological dispersion device, or dirty bomb. Although experts believe that a dirty bomb would result in a limited number of deaths. it could have severe economic consequences. Depending on the type. amount. and form. the dispersed radiological material could cause radiation sickness for people nearby and produce serious economic and psychological disruption associated with the evacuation and subsequent cleanup of the contaminated area. Nuclear terrorism is both likely and dangerous- ramification of an attack have both devastating and global ramifications Pitts-Kiefer 14 (Samantha Pitts-Kiefer, Senior Project Ofcer, Nuclear Threat Initiative (NTI) completed a master’s degree in public administration at the Harvard Kennedy School where she focused on foreign policy and national security. At the Kennedy School, Pitts-Kiefer studied under Graham Allison and Matthew Bunn and was Graham Allison’s course assistant, 2014, “NUCLEAR NIGHTMARES” http://www.nti.org/media/pdfs/Nuclear_Nightmares.pdf?_=1417020879 7/8/15 ZEC) During the Cold War, the United States and the Soviet Union built up vast amounts of nuclear weapons and materials. The Cuban Missile Crisis heightened fears that the nuclear arms race could result in destruction on a massive scale, whether as a result of an intentional or accidental launch and detonation of a nuclear bomb. As the Cold War came to a close, a new threat emerged: nuclear terrorism. With the disintegration of the Soviet Union, nuclear weapons and materials were left scattered across hundreds of sites in former Soviet states prompting urgent concern that smugglers or terrorists would steal enough material for a bomb. Russia and the United States worked together, through the Nunn-Lugar Cooperative Threat Reduction Program, to dismantle and destroy thousands of weapons and to ensure that the nuclear materials from those weapons were disposed of safely. Despite all that has been achieved, the security of weapons-usable nuclear materials remains an urgent concern, while at the same time terrorist groups have grown more sophisticated and more adept at carrying out mass-casualty attacks. So, today’s leaders and citizens face a chilling prospect: the detonation of a crude nuclear weapon built by terrorists with materials stolen or purchased on the black market. Though the al Qaeda that attacked the United States on 9/11 has been much diminished, al Qaeda affiliates in the Arabian Peninsula and Northern Africa, ISIL, and terrorist organizations like al-Shabaab in Somalia remind us that the terrorist threat is dynamic, constantly evolving, and, most of all, enduring. At the same time, the materials needed to build a bomb are spread around the world. Globally, there are approximately 2,000 metric tons of weapons-usable nuclear material (plutonium and highly enriched uranium or HEU) located at hundreds of sites—some of them poorly secured—scattered across twenty-five countries. Building one bomb requires only enough HEU to fill a five-pound bag of sugar or a quantity of plutonium the size of a grapefruit. Terrorists also have access to the technology and know-how needed to build a crude nuclear device, and a number of terrorist groups have in the past stated a desire to acquire and use a nuclear bomb. The consequences of detonating such a bomb in a major city would be staggering: hundreds of thousands of casualties; longlasting environmental damage; economic losses in the hundreds of billions; and considerable political and social ramifications. No matter where a bomb is detonated, the consequences would reverberate around the globe. To build a bomb the biggest challenge terrorists face is obtaining enough HEU or separated plutonium. Every step after acquiring the material—building the bomb, transporting it, and detonating it—is easier for terrorists to take and harder for the international community to stop. So it is imperative that terrorists don’t get a hold of the materials. Today, there are myriad ways that a well-organized and sufficiently-funded terrorist group could seize the materials they need to build an improvised nuclear device that would destroy the heart of a city. They could send a team of armed assailants to overwhelm guards at an understaffed nuclear facility or to attack a convoy transporting weapons-usable nuclear materials from one facility to another. A terrorist or criminal network could corrupt insiders or use a cyberattack to defeat security controls. That is why ensuring that all weapons-usable nuclear material is properly secured to the highest standards is the key to preventing nuclear terrorism. Risk of nuclear terror is high and likely Ogilvie-White 2014 Dr Tanya Ogilvie-White, former senior analyst at the Australian Strategic Policy Institute; Stanton nuclear security fellow at the International Institute for Strategic Studies, senior lecturer in international relations at the University of Canterbury, Preventing Nuclear Terrorism, Australia’s Leadership Role, https://www.aspi.org.au/publications/preventing-nuclear-terrorism-australiasleadership-role/SR63_prevent_nuclear_terrorism.pdf The main worry about the theft and trafficking of nuclear and radiological materials is that they will end up in the hands of terrorist groups, who will use them in INDs or RDDs. Even in the case of an RDD, which is a more likely scenario but would be much less lethal than an IND, radioactive contamination in a densely populated area could have serious economic and social consequences. Although a successful RDD attack has never been perpetrated, there’s evidence that terrorists have invested in such devices: Chechen separatists were involved in two incidents involving radioactive materials in November 1995 and December 1998, and more recently intelligence agencies in mainland Europe, Thailand, the UK and the US have managed to foil RDD plots before they reached fruition. In 2012, the International Atomic Energy Agency (IAEA) Incident and Trafficking Database reported 160 incidents involving the illegal trade and movement of nuclear or other radioactive material across national borders. Of those, 17 involved possession and related criminal activities, 24 involved theft or loss and 119 involved other unauthorised activities. Two incidents involved highly enriched uranium (HEU) in unauthorised activities. There were also three incidents involving dangerous Category 1–3 radioactive sources, two of which were thefts. Information reported to the database demonstrates that: • the availability of unsecured nuclear and other radioactive material persists • although effective border control measures help to detect illicit trafficking, effective controls aren’t uniformly implemented at all international border points • individuals and groups are prepared to engage in trafficking this material. The possibility of RDD or, worse, IND detonation is real and, while the risks need to be kept in perspective, they need to be taken seriously . One of the most worrying recent cases of illicit trafficking involving HEU occurred in June 2011 in Moldova, where officials arrested six people with a quantity of weapon-grade material. The group claimed to have access to plutonium and up to 9 kilograms of HEU, which they were willing to sell for $31 million. A serious buyer, reportedly of North African origin, appears to have been involved and remains at large. Research reactors are considered vulnerable to thefts of nuclear and radiological materials because they’re often located on university campuses or in larger scientific research centres, which are relatively open to the public or have many users and visitors. Moreover, other than the amended Convention on the Physical Protection of Nuclear Material, which has yet to enter into force, there’s no internationally binding requirement for securing these facilities. Since 2003, however, the US and the IAEA have been working with various countries to reduce the risks associated with research reactors. Many countries with HEU-fuelled research reactors, including some in Australia’s near neighbourhood, have taken part in securing HEU and converting the reactors to use low-enriched uranium (LEU). In particular, HEU has been removed and secured from Indonesia, the Philippines, Thailand and, most recently, Vietnam. Of course, LEU-fuelled research reactors remain a target for terrorists who wish to spread ionising radiation or damage a symbolic facility representing technological progress, and most research reactors have substantial quantities of sealed sources that are potentially vulnerable to theft. its High risk - acquisition know-how and , motivation Robichaud 14 (Carl, specialist in nuclear policy at Carnegie Corporation of New York, The Hill, "Preventing nuclear terrorism requires bold action," http://webcache.googleusercontent.com/search?q=cache:sIkI4u49jooJ:thehill.com/blogs/congr ess-blog/homeland-security/201395-preventing-nuclear-terrorism-requires-boldaction+&cd=11&hl=en&ct=clnk&gl=us) Nuclear terrorism is one of the most serious threats of the 21st century. Fortunately, the threat is a preventable one: consolidate and lock down weapons-usable materials and you dramatically reduce the risks. At the Nuclear Security Summit this week, President Obama and more than 50 world leaders will gather in The Hague with an opportunity to take a major step forward in doing just that. But taking the next step in this process will require strong leadership and skillful diplomacy. Though they rarely make the headlines, cases of smuggling, theft or loss of nuclear and radiological materials are alarmingly frequent. Over the past few years we’ve seen incidents from Moldova to India, South Africa to Japan. Just a few months ago in Mexico, carjackers unwittingly heisted radiological materials that, in the wrong hands, could have done significant harm. In fact, more than one hundred thefts and other incidents are reported to the International Atomic Energy Agency (IAEA) each year. In many of these instances we still do not know where the material came from, who stole it, or where it was headed. Nuclear technology is widespread, used not only in power production but in medicine, mining, and other industries. As a result, dozens of countries possesses radiological materials that could be used in a “dirty bomb.” Beyond that, over 25 countries have highly-enriched uranium or plutonium—enough to build more than 20,000 new weapons like the one that destroyed Hiroshima and almost 80,000 like the one that destroyed Nagasaki. In the wrong hands, it wouldn’t take much plutonium or highly enriched uranium to fashion a nuclear device. You could fit a bombs-worth of this material into a lunch box. Al-Qaeda and other terrorist groups around the globe have expressed intent to acquire weapons-usable materials. If they succeed there is little doubt they would use such a device. Thus the spread of these materials is a grave threat—not only to the United States but to any country that relies upon the global economy, which would be severely disrupted if an attack ever succeeded. Robert Gates, former U.S. Secretary of Defense, noted that, “Every senior leader, when you’re asked what keeps you awake at night, it’s the thought of a terrorist ending up with a weapon of mass destruction, especially nuclear.” 2 – its High risk - acquisition know-how and , motivation Robichaud 14 (Carl, specialist in nuclear policy at Carnegie Corporation of New York, The Hill, "Preventing nuclear terrorism requires bold action," http://webcache.googleusercontent.com/search?q=cache:sIkI4u49jooJ:thehill.com/blogs/congr ess-blog/homeland-security/201395-preventing-nuclear-terrorism-requires-boldaction+&cd=11&hl=en&ct=clnk&gl=us) Nuclear terrorism is one of the most serious threats of the 21st century. Fortunately, the threat is a preventable one: consolidate and lock down weapons-usable materials and you dramatically reduce the risks. At the Nuclear Security Summit this week, President Obama and more than 50 world leaders will gather in The Hague with an opportunity to take a major step forward in doing just that. But taking the next step in this process will require strong leadership and skillful diplomacy. Though they rarely make the headlines, cases of smuggling, theft or loss of nuclear and radiological materials are alarmingly frequent. Over the past few years we’ve seen incidents from Moldova to India, South Africa to Japan. Just a few months ago in Mexico, carjackers unwittingly heisted radiological materials that, in the wrong hands, could have done significant harm. In fact, more than one hundred thefts and other incidents are reported to the International Atomic Energy Agency (IAEA) each year. In many of these instances we still do not know where the material came from, who stole it, or where it was headed. Nuclear technology is widespread, used not only in power production but in medicine, mining, and other industries. As a result, dozens of countries possesses radiological materials that could be used in a “dirty bomb.” Beyond that, over 25 countries have highly-enriched uranium or plutonium—enough to build more than 20,000 new weapons like the one that destroyed Hiroshima and almost 80,000 like the one that destroyed Nagasaki. In the wrong hands, it wouldn’t take much plutonium or highly enriched uranium to fashion a nuclear device. You could fit a bombs-worth of this material into a lunch box. Al-Qaeda and other terrorist groups around the globe have expressed intent to acquire weapons-usable materials. If they succeed there is little doubt they would use such a device. Thus the spread of these materials is a grave threat—not only to the United States but to any country that relies upon the global economy, which would be severely disrupted if an attack ever succeeded. Robert Gates, former U.S. Secretary of Defense, noted that, “Every senior leader, when you’re asked what keeps you awake at night, it’s the thought of a terrorist ending up with a weapon of mass destruction, especially nuclear.” Terror Adv – Nuclear Terror Causes Extinction Causes US-Russia miscalc—extinction Barrett et al, RAND Stanton nuclear security fellow, 2013 [Anthony, PhD in Engineering and Public Policy from Carnegie Mellon University, and Director of Research at Global Catastrophic Risk Institute—AND Seth Baum, PhD in Geography from Pennsylvania State University, Research Scientist at the Blue Marble Space Institute of Science, and Executive Director of Global Catastrophic Risk Institute—AND Kelly Hostetler, BS in Political Science from Columbia and Research Assistant at Global Catastrophic Risk Institute, 6-24-13, Science & Global Security: The Technical Basis for Arms Control, Disarmament, and Nonproliferation Initiatives, Volume 21, Issue 2, “Analyzing and Reducing the Risks of Inadvertent Nuclear War Between the United States and Russia,” Tanfonline] War involving significant fractions of the U.S. and Russian nuclear arsenals, which are by far the largest of any nations, could have globally catastrophic effects such as severely reducing food production for years, 1 potentially leading to collapse of modern civilization worldwide, and even the extinction of humanity. 2 Nuclear war between the United States and Russia could occur by various routes, including accidental or unauthorized launch; deliberate first attack by one nation; and inadvertent attack. In an accidental or unauthorized launch or detonation, system safeguards or procedures to maintain control over nuclear weapons fail in such a way that a nuclear weapon or missile launches or explodes without direction from leaders. In a deliberate first attack, the attacking nation decides to attack based on accurate information about the state of affairs. In an inadvertent attack, the attacking nation mistakenly concludes that it is under attack and launches nuclear weapons in what it believes is a counterattack. 3 (Brinkmanship strategies incorporate elements of all of the above, in that they involve intentional manipulation of risks from otherwise accidental or inadvertent launches. 4 ) Over the years, nuclear strategy was aimed primarily at minimizing risks of intentional attack through development of deterrence capabilities, and numerous measures also were taken to reduce probabilities of accidents, unauthorized attack, and inadvertent war. For purposes of deterrence, both U.S. and Soviet/Russian forces have maintained significant capabilities to have some forces survive a first attack by the other side and to launch a subsequent counterattack. However, concerns about the extreme disruptions that a first attack would cause in the other side's forces and command-and-control capabilities led to both sides’ development of capabilities to detect a first attack and launch a counter-attack before suffering damage from the first attack. 5 Many people believe that with the end of the Cold War and with improved relations between the United States and Russia, the risk of East-West nuclear war was significantly reduced. 6 However, it also has been argued that inadvertent nuclear war between the United States and Russia has continued to present a substantial risk. 7 While the United States and Russia are not actively threatening each other with war, they have remained ready to launch nuclear missiles in response to indications of attack. 8 False indicators of nuclear attack could be caused in several ways. First, a wide range of events have already been mistakenly interpreted as indicators of attack, including weather phenomena, a faulty computer chip, wild animal activity, and control-room training tapes loaded at the wrong time. 9 Second, terrorist groups or other actors might cause attacks on either the United States or Russia that resemble some kind of nuclear attack by the other nation by actions such as exploding a stolen or improvised nuclear bomb, 10 especially if such an event occurs during a crisis between the United States and Russia. 11 A variety of nuclear terrorism scenarios are possible. 12 Al Qaeda has sought to obtain or construct nuclear weapons and to use them against the United States. 13 Other methods could involve attempts to circumvent nuclear weapon launch control safeguards or exploit holes in their security. 14 It has long been argued that the probability of inadvertent nuclear war is significantly higher during U.S.– Russian crisis conditions, 15 with the Cuban Missile Crisis being a prime historical example. It is possible that U.S.–Russian relations will significantly deteriorate in the future, increasing nuclear tensions. There are a variety of ways for a third party to raise tensions between the United States and Russia, making one or both nations more likely to misinterpret events as attacks. 16 Absent retaliation, it is sufficient to trigger extinction. Robock, Rutgers University environmental sciences professor, 2011 [Alan, Nature International weekly journal of science 473, 5-19-11, “Nuclear winter is a real and present danger” http://www.nature.com/nature/journal/v473/n7347/full/473275a.html] Yet the environmental threat of nuclear war has not gone away. The world faces the prospect of a smaller, but still catastrophic, nuclear conflict. There are now nine nuclear-weapons states. Use of a fraction of the global nuclear arsenal by anyone, from the superpowers to India versus Pakistan, still presents the largest potential environmental danger to the planet by humans. That threat is being ignored. One reason for this denial is that the prospect of a nuclear war is so horrific on so many levels that most people simply look away. Two further reasons are myths that persist among the general public: that the nuclear winter theory has been disproved, and that nuclear winter is no longer a threat. These myths need to be debunked. The term 'nuclear winter', coined by Carl Sagan and his colleagues in a 1983 paper1 in Science, describes the dramatic effects on the climate caused by smoke from fires ignited by nuclear attacks on cities and industrial areas. In the 1980s my colleagues and I calculated, using the best climate models available at the time, that if one-third of the existing arsenal was used, there would be so much smoke that surface temperatures would plummet below freezing around the world for months, killing virtually all plants and producing worldwide famine. More people could die in China from starvation than in the nations actively bombing each other. As many countries around the world realized that a superpower nuclear war would be a disaster for them, they pressured the superpowers to end their arms race. Sagan did a good job of summarizing the policy impacts2 in 1984: although weapons were continuing to be built, it would be suicide to use them. The idea of climatic catastrophe was fought against by those who wanted to keep the nuclear-weapon industry alive, or who supported the growth of nuclear arsenals politically3. Scientifically, there was no real debate about the concept, only about the details. In 1986, atmospheric researchers Starley Thompson and Stephen Schneider wrote a piece in Foreign Affairs appraising the theory4 and highlighting what they saw as the patchiness of the effect. They coined the term 'nuclear autumn', noting that it wouldn't be 'winter' everywhere in the aftermath of a nuclear attack. They didn't mean for people to think that it would be all raking leaves and football games, but many members of the public, and some pronuclear advocates, preferred to take it that way. The fight over the details of the modelling caused a rift between Sagan and Schneider that never healed. When I bring up the topic of nuclear winter, people invariably tell me that they think the theory has been disproved. But research continues to support the original concept. By 2007, models had began to approximate a realistic atmosphere up to 80 kilometres above Earth's surface, including the stratosphere and mesosphere. This enabled me, and my coauthors, to calculate for the first time that smoke particles would be heated by the Sun and lifted into the upper stratosphere, where they would stay for many years5, 6. So the cooling would last for much longer than we originally thought. Dark days Many of those who do accept the nuclear-winter concept think that the scenario applies only to a mass conflict, on a scale no longer conceivable in the modern world. This is also false. A 'small' nuclear war between India and Pakistan, with each using 50 Hiroshima-size bombs (far less than 1% of the current arsenal), if dropped on megacity targets in each country would produce climate change unprecedented in recorded human history5. Five million tonnes of black carbon smoke would be emitted into the upper troposphere from the burning cities, and then be lofted into the stratosphere by the heat of the Sun. Temperatures would be lower than during the 'Little Ice Age' (1400–1850), during which famine killed millions. For several years, growing seasons would be shortened by weeks in the mid-latitudes (see 'A decade of cooling). Brian Toon at the University of Colorado in Boulder, Richard Turco at the University of California, Los Angeles, Georgiy Stenchikov at Rutgers University in New Brunswick, New Jersey, and I, all of whom were pioneers in nuclear-winter research in the 1980s, have tried, along with our students, to publicize our results. We have published refereed journal articles, popular pieces in Physics Today and Scientific American, a policy forum in Science, and now this article. But Foreign Affairs and Foreign Policy, perhaps the two most prominent foreign-policy magazines in English, would not even review articles we submitted. We have had no luck getting attention from the US government. Toon and I visited the US Congress and gave briefings to congressional staff on the subject two years ago, but nothing happened as a result. The US President's science adviser John Holdren has not responded to our requests — in 2009 and more recently — for consideration of new scientific results in US nuclear policy. Yes Extinction – AT: No Retaliation Retaliation causes global nuclear war Hellman, Professor Emeritus of Electrical Engineering, Stanford University, 8 [Martin, Spring, “Risk Analysis of Nuclear Deterrence”, http://nuclearrisk.org/3likely.php] Nuclear proliferation and the specter of nuclear terrorism are creating additional possibilities for triggering a nuclear war. If an American (or Russian) city were devastated by an act of nuclear terrorism, the public outcry for immediate, decisive action would be even stronger than Kennedy had to deal with when the Cuban missiles first became known to the American public. While the action would likely not be directed against Russia, it might be threatening to Russia (e.g., on its borders) or one of its allies and precipitate a crisis that resulted in a fullscale nuclear war. Terrorists with an apocalyptic mindset might even attempt to catalyze a full-scale nuclear war by disguising their act to look like an attack by the U.S. or Russia. That escalates to global nuclear war Speice, JD Candidate, February 2006 [Patrick, 47 Wm and Mary L. Rev. 1427, Lexis] The potential consequences of the unchecked spread of nuclear knowledge and material to terrorist groups that seek to cause mass destruction in the United States are truly horrifying. A terrorist attack with a nuclear weapon would be devastating in terms of immediate human and economic losses. n49 Moreover, there would be immense political pressure in the United States to discover the perpetrators and retaliate with nuclear weapons, massively increasing the number of casualties and potentially triggering a full-scale nuclear conflict. N50 In addition to the threat posed by terrorists, leakage of nuclear knowledge and material from Russia will reduce the barriers that states with nuclear ambitions face and may trigger widespread proliferation of nuclear weapons. n51 This proliferation will increase the risk of nuclear attacks against the United States [*1440] or its allies by hostile states, n52 as well as increase the likelihood that regional conflicts will draw in the United States and escalate to the use of nuclear weapons. Yes Extinction – AT: Not Feasible Nuclear terrorism is feasible, there are no barriers and there’s motivation for an attack now Bunn et al. 14 [March 2014, Matthew Bunn is a Professor of Practice at the Harvard Kennedy School. His research interests include nuclear theft and terrorism; nuclear proliferation and measures to control it; the future of nuclear energy and its fuel cycle; and innovation in energy technologies, he served as an adviser to the White House Office of Science and Technology Policy, as a study director at the National Academy of Sciences, and as editor of Arms Control Today, author or co-author of more than 20 books or major technical reports, and over a hundred articles in publications, Martin B. Malin, the Executive Director of the Project on Managing the Atom at the Belfer Center for Science and International Affairs at Harvard’s Kennedy School of Government, focuses on arms control and nonproliferation in the Middle East, US nonproliferation and counter-proliferation strategies, and the security consequences of the growth and spread of nuclear energy. Malin taught international relations, American foreign policy, and Middle East politics at Columbia University, Barnard College, and Rutgers University, served as Director of the Program on Science and Global Security at the American Academy of Arts and Sciences. Nickolas Roth is a research associate at the Project on Managing the Atom. Mr. has a Masters of Public Policy from the University of Maryland. While at Maryland, he served as a research assistant for the Center for International and Security Studies’ Nuclear Materials Accounting Project. He has expertise in national security issues related to US nuclear weapons policy. William H. Tobey is a Senior Fellow at the Belfer Center for Science and International Affairs. He was most recently Deputy Administrator for Defense Nuclear Nonproliferation at the National Nuclear Security Administration. There, he managed the US government’s largest program to prevent nuclear proliferation and terrorism by detecting, securing, and disposing of dangerous nuclear material. Mr. Tobey also served on the National Security Council Staff in three administrations, in defense policy, arms control, and counter-proliferation positions. He has participated in international negotiations ranging from the START talks with the Soviet Union to the Six Party Talks with North Korea. He is chair of the board of directors of the World Institute for Nuclear Security, “Advancing Nuclear Security: Evaluating Progress and Setting New Goals,” http://belfercenter.ksg.harvard.edu/files/advancingnuclearsecurity.pdf] Unfortunately, nuclear and radiological terrorism remain real and dangerous threats.1 The conclusion the assembled leaders reached at the Washington Nuclear Security Summit and reaffirmed in Seoul remains correct: “Nuclear terrorism continues to be one of the most challenging threats to international security. Defeating this threat requires strong national measures and international cooperation given its potential global political, economic, social, and psychological consequences.”2 There are three types of nuclear or radiological terrorist attack: • Nuclear weapons. Terrorists might be able to get and detonate an assembled nuclear weapon made by a state, or make a crude nuclear bomb from stolen separated plutonium or HEU. This would be the most difficult type of nuclear terrorism for terrorists to accomplish— but the devastation could be absolutely horrifying, with political and economic aftershocks reverberating around the world. • “Dirty bombs.” A far simpler approach would be for terrorists to obtain radiological materials— available in hospitals, industrial sites, and more—and disperse them to contaminate an area with radioactivity, using explosives or any number of other means. In most scenarios of such attacks, few people would die from the radiation—but the attack could spread fear, force the evacuation of many blocks of a major city, and inflict billions of dollars in costs of cleanup and economic disruption. While a dirty bomb attack would be much easier for terrorists to carry out than an attack using a nuclear explosive, the consequences would be far less—an expensive and disruptive mess, but not the heart of a major city going up in smoke. • Nuclear sabotage. Terrorists could potentially cause a Fukushima-like meltdown at a nuclear reactor or sabotage a spent fuel pool or high-level waste store. An unsuccessful sabotage would have little effect, but a successful one could spread radioactive material over a huge area. Both the scale of the consequences and the difficulty of carrying out a successful attack would be intermediate between nuclear weapons and dirty bombs. Overall, while actual terrorist use of a nuclear weapon may be the least likely of these dangers, its consequences would be so overwhelming that we believe it poses the most significant risk. A similar judgment drove the decision to focus the four-year effort on securing nuclear weapons and the materials needed to make them. Most of this report will focus on the threat of terrorist use of nuclear explosives, but the overall global governance framework for nuclear security is relevant to all of these dangers. The danger of nuclear terrorism is driven by three key factors—terrorist intent to escalate to the nuclear level of violence; potential terrorist capability to do so; and the vulnerability of nuclear weapons and the materials needed to enable terrorists to carry out such an attack—the motive, means, and opportunity of a monstrous crime. Terrorist intent. While most terrorist groups are still focused on small-scale violence for local political purposes, we now live in an age that includes some groups intent on inflicting largescale destruction to achieve their objectives. Over the past quarter century, both al Qaeda and the Japanese terror cult Aum Shinrikyo seriously sought nuclear weapons and the nuclear materials and expertise needed to make them. Al Qaeda had a focused program reporting directly to Ayman al-Zawahiri (now head of the group), which progressed as far as carrying out crude but sensible conventional explosive tests for the nuclear program in the desert of Afghanistan. There is some evidence that North Caucusus terrorists also sought nuclear weapons—including incidents in which terrorist teams were caught carrying out reconnaissance on Russian nuclear weapon storage sites, whose locations are secret.3 Despite the death of Osama bin Laden and the severe disruption of the core of al Qaeda, there are no grounds for complacency. There is every reason to believe Zawahiri remains eager to inflict destruction on a nuclear scale. Indeed, despite the large number of al Qaeda leaders who have been killed or captured, nearly all of the key players in al Qaeda’s nuclear program remain alive and at large—including Abdel Aziz al-Masri, an Egyptian explosives expert who was al Qaeda’s “nuclear CEO.” In 2003, when al Qaeda operatives were negotiating to buy three of what they thought were nuclear weapons, senior al Qaeda officials told them to go ahead and make the purchase if a Pakistani expert with equipment confirmed the items were genuine. The US government has never managed to determine who the Pakistani nuclear weapons expert was in whom al Qaeda had such confidence—and what he may have been doing in the intervening decade. More fundamentally, with at least two, and probably three, groups having gone down this path in the past 25 years, there is no reason to expect they will be the last. The danger of nuclear terrorism will remain as long as nuclear weapons, the materials needed to make them, and terrorist groups bent on large-scale destruction co-exist. Potential terrorist capabilities. No one knows what capabilities a secret cell of al Qaeda may have managed to retain or build. Unfortunately, it does not take a Manhattan Project to make a nuclear bomb—indeed, over 90 percent of the Manhattan Project effort was focused on making the nuclear materials, not on designing and building the weapons. Numerous studies by the United States and other governments have concluded that it is plausible that a sophisticated terrorist group could make a crude nuclear bomb if it got enough separated plutonium or HEU.4 A “gun-type” bomb, such as the weapon that obliterated Hiroshima, fundamentally involves slamming two pieces of HEU together at high speed. An “implosion-type” bomb, which is needed to get a substantial explosive yield from plutonium, requires crushing nuclear material to a higher density— a more complex task, but still plausible for terrorists, especially if they got knowledgeable help. Many analysts argue that, since states spend billions of dollars and assign hundreds or thousands of people to building nuclear weapons, it is totally implausible that terrorists could carry out this task. Unfortunately, this argument is wrong, for two reasons. First, as the Manhattan Project statistic suggests, the difficult part of making a nuclear bomb is making the nuclear material. That is what states spend billions seeking to accomplish. Terrorists are highly unlikely to ever be able to make their own bomb material—but if they could get stolen material, that step would be bypassed. Second, it is far easier to make a crude, unsafe, unreliable bomb of uncertain yield, which might be delivered in the back of a truck, than to make the kind of nuclear weapon a state would want in its arsenal—a safe, reliable weapon of known yield that can be delivered by missile or combat aircraft. It is highly unlikely terrorists will ever be able to build that kind of nuclear weapon. Remaining vulnerabilities. While many countries have done a great deal to strengthen nuclear security, serious vulnerabilities remain. Around the world, there are stocks of nuclear weapons or materials whose security systems are not sufficient to protect against the full range of plausible outsider and insider threats they may face. As incidents like the intrusion at Y-12 in the United States in 2012 make clear, many nuclear facilities and transporters still grapple with serious problems of security culture. It is fair to say that every country where nuclear weapons, weaponsusable nuclear materials, major nuclear facilities, or dangerous radiological sources exist has more to do to ensure that these items are sustainably secured and accounted for. At least three lines of evidence confirm that important nuclear security weaknesses continue to exist. First, seizures of stolen HEU and separated plutonium continue to occur, including, mostly recently HEU seizures in 2003, 2006, 2010, and 2011.5 These seizures may result from material stolen long ago, but, at a minimum, they make clear that stocks of HEU and plutonium remain outside of regulatory control. Second, in cases where countries do realistic tests to probe whether security systems can protect against teams of clever adversaries determined to find a weak point, the adversaries sometimes succeed—even when their capabilities are within the set of threats the security system is designed to protect against. This happens with some regularity in the United States (though less often than before the 9/11 attacks); if more countries carried out comparable performance tests, one would likely see similar results. Third, in real non-nuclear thefts and terrorist attacks around the world, adversaries sometimes demonstrate capabilities and tactics well beyond what many nuclear security systems would likely be able to handle (see the discussion of the recent Västberga incident in Sweden). being caught.6 And terrorists are unlikely to have enough money to make a substantial difference in either the odds of regime survival or the wealth of a regime’s elites, even in North Korea, one of the poorest countries on earth. On the other hand, serious risks would arise in North Korea, or other nuclear-armed states, in the event of state collapse—and as North Korea’s stockpile grows, one could imagine a general managing some of that stockpile concluding he could sell a piece of it and provide a golden parachute for himself and his family without getting caught. No one knows the real likelihood of nuclear terrorism. But the consequences of a terrorist nuclear blast would be so catastrophic that even a small chance is enough to justify urgent action to reduce the risk. The heart of a major city could be reduced to a smoldering radioactive ruin, leaving tens to hundreds of thousands of people dead. The perpetrators or others might claim to have more weapons already hidden in other major cities and threaten to set them off if their demands were not met—potentially provoking uncontrolled evacuation of many urban centers. Devastating economic consequences would reverberate worldwide. Kofi Annan, while serving as Secretary-General of the United Nations, warned that the global economic effects of a nuclear terrorist attack in a major city would push “tens of millions of people into dire poverty,” creating a “second death toll throughout the developing world.”7 Attacks are feasible Bunn, et al, 13 [October 2nd 2013, Bunn, Matthew, Valentin Kuznetsov, Martin B. Malin, Yuri Morozov, Simon Saradzhyan, William H. Tobey, Viktor I. Yesin, and Pavel S. Zolotarev. "Steps to Prevent Nuclear Terrorism." Paper, Belfer Center for Science and International Affairs, Harvard Kennedy School, October 2, 2013, Matthew Bunn. Professor of the Practice of Public Policy at Harvard Kennedy School andCo-Principal Investigator of Project on Managing the Atom at Harvard University’s Belfer Center for Science and International Affairs. • Vice Admiral Valentin Kuznetsov (retired Russian Navy). Senior research fellow at the Institute for U.S. and Canadian Studies of the Russian Academy of Sciences, Senior Military Representative of the Russian Ministry of Defense to NATO from 2002 to 2008. • Martin Malin. Executive Director of the Project on Managing the Atom at the Belfer Center for Science and International Affairs. • Colonel Yuri Morozov (retired Russian Armed Forces). Professor of the Russian Academy of Military Sciences and senior research fellow at the Institute for U.S. and Canadian Studies of the Russian Academy of Sciences, chief of department at the Center for Military-Strategic Studies at the General Staff of the Russian Armed Forces from 1995 to 2000. • Simon Saradzhyan. Fellow at Harvard University’s Belfer Center for Science and International Affairs, Moscow-based defense and security expert and writer from 1993 to 2008. • William Tobey. Senior fellow at Harvard University’s Belfer Center for Science and International Affairs and director of the U.S.-Russia Initiative to Prevent Nuclear Terrorism, deputy administrator for Defense Nuclear Nonproliferation at the U.S. National Nuclear Security Administration from 2006 to 2009. • Colonel General Viktor Yesin (retired Russian Armed Forces). Leading research fellow at the Institute for U.S. and Canadian Studies of the Russian Academy of Sciences and advisor to commander of the Strategic Missile Forces of Russia, chief of staff of the Strategic Missile Forces from 1994 to 1996. • Major General Pavel Zolotarev (retired Russian Armed Forces). Deputy director of the Institute for U.S. and Canadian Studies of the Russian Academy of Sciences, head of the Information and Analysis Center of the Russian Ministry of Defense from1993 to 1997, section head - deputy chief of staff of the Defense Council of Russia from 1997 to 1998, "Steps to Prevent Nuclear Terrorism," http://belfercenter.ksg.harvard.edu/files/JTA%20eng%20web2.pdf] In 2011, Harvard’s Belfer Center for Science and International Affairs and the Russian Academy¶ of Sciences’ Institute for U.S. and Canadian Studies published “The U.S. – Russia Joint Threat¶ Assessment on Nuclear Terrorism.” The assessment analyzed the means, motives, and access of¶ would-be nuclear terrorists, and concluded that the threat of nuclear terrorism is urgent and real.¶ The Washington and Seoul Nuclear Security Summits in 2010 and 2012 established and demonstrated a consensus among political leaders from around the world that nuclear terrorism poses a serious threat to the peace, security, and prosperity of our planet. For any country, a terrorist attack with a nuclear device would be an immediate and catastrophic disaster, and the negative effects would reverberate around the world far beyond the location and moment of the detonation. Preventing a nuclear terrorist attack requires international cooperation to secure nuclear materials,¶ especially among those states producing nuclear materials and weapons. As the world’s two¶ greatest nuclear powers, the United States and Russia have the greatest experience and capabilities¶ in securing nuclear materials and plants and, therefore, share a special responsibility to lead¶ international efforts to prevent terrorists from seizing such materials and plants.¶ The depth of convergence between U.S. and Russian vital national interests on the issue of¶ nuclear security is best illustrated by the fact that bilateral cooperation on this issue has continued¶ uninterrupted for more than two decades, even when relations between the two countries¶ occasionally became frosty, as in the aftermath of the August 2008 war in Georgia.¶ Russia and the United States have strong incentives to forge a close and trusting partnership to¶ prevent nuclear terrorism and have made enormous progress in securing fissile material both at¶ home and in partnership with other countries. However, to meet the evolving threat posed by¶ those individuals intent upon using nuclear weapons for terrorist purposes, the United States and¶ Russia need to deepen and broaden their cooperation.¶ The 2011 “U.S. - Russia Joint Threat Assessment” offered both specific conclusions about the¶ nature of the threat and general observations about how it might be addressed. This report builds¶ on that foundation and analyzes the existing framework for action, cites gaps and deficiencies,¶ and makes specific recommendations for improvement.¶ “The U.S. – Russia Joint Threat Assessment on Nuclear Terrorism” (The 2011 report¶ executive summary): • Nuclear terrorism is a real and urgent threat. Urgent actions are required to reduce the risk. The risk is driven by the rise of terrorists who seek to inflict unlimited damage, many of¶ whom have sought justification for their plans in radical interpretations of Islam; by the¶ spread of information about the decades-old technology of nuclear weapons; by the increased¶ availability of weapons-usable nuclear materials; and by globalization, which makes it easier¶ to move people, technologies, and materials across the world. • Making a crude nuclear bomb would not be easy, but is potentially within the capabilities of¶ a technically sophisticated terrorist group, as numerous government studies have confirmed.¶ Detonating a stolen nuclear weapon would likely be difficult for terrorists to accomplish, if¶ the weapon was equipped with modern technical safeguards (such as the electronic locks¶ known as Permissive Action Links, or PALs). Terrorists could, however, cut open a stolen¶ nuclear weapon and make use of its nuclear material for a bomb of their own. • The nuclear material for a bomb is small and difficult to detect, making it a major challenge¶ to stop nuclear smuggling or to recover nuclear material after it has been stolen. Hence, a primary¶ focus in reducing the risk must be to keep nuclear material and nuclear weapons from¶ being stolen by continually improving their security, as agreed at the Nuclear Security Summit¶ in Washington in April 2010. • Al-Qaeda has sought nuclear weapons for almost two decades. The group has repeatedly¶ attempted to purchase stolen nuclear material or nuclear weapons, and has repeatedly attempted¶ to recruit nuclear expertise. Al-Qaeda reportedly conducted tests of conventional¶ explosives for its nuclear program in the desert in Afghanistan. The group’s nuclear ambitions¶ continued after its dispersal following the fall of the Taliban regime in Afghanistan.¶ Recent writings from top al-Qaeda leadership are focused on justifying the mass slaughter of¶ civilians, including the use of weapons of mass destruction, and are in all likelihood intended¶ to provide a formal religious justification for nuclear use. • While there are significant gaps in coverage of the group’s activities, al-Qaeda appears to¶ have been frustrated thus far in acquiring a nuclear capability; it is unclear whether the the¶ group has acquired weapons-usable nuclear material or the expertise needed to make such¶ material into a bomb. Furthermore, pressure from a broad range of counter-terrorist actions¶ probably has reduced the group’s ability to manage large, complex projects, but has not¶ eliminated the danger. However, there is no sign the group has abandoned its nuclear ambitions.¶ On the contrary, leadership statements as recently as 2008 indicate that the intention to¶ acquire and use nuclear weapons is as strong as ever. There are no checks on acquisition – lack of border controls and ease of theft Ogilvie-White, independent researcher specializing in nuclear issues, and Santoro, senior fellow at the Pacific Forum CSIS, 14 [Dr Tanya, independent researcher specializing in nuclear issues, based in Canberra, Australia. Previously, she was senior analyst at the Australian Strategic Policy Institute; Stanton nuclear security fellow at the International Institute for Strategic Studies, UK; nuclear non-proliferation researcher at the Mountbatten Centre for International Studies, trustee of the New Zealand Centre for Global Studies, a member of the Council on Security Cooperation in the Asia-Pacific, Asia-Pacific representative of the Fissile Material Working Group, and associate editor of Asian Security. Dr David Santoro is a senior fellow at the Pacific Forum CSIS. He directs the Forum’s nuclear policy programs and works on nonproliferation and nuclear security, disarmament, and deterrence, on which he has published widely. Prior to joining the Forum, he worked on nuclear policy issues in France, Australia, Canada, and the United Kingdom, including at the Institute for International Strategic Studies as a Stanton nuclear security fellow, Australian Strategic Policy Institute, “Preventing Nuclear Terrorism, Australia’s Leadership Role,” https://www.aspi.org.au/publications/preventing-nuclear-terrorism-australias-leadershiprole/SR63_prevent_nuclear_terrorism.pdf] The main worry about the theft and trafficking of nuclear and¶ radiological materials is that they will end up in the hands of¶ terrorist groups, who will use them in INDs or RDDs. Even in¶ the case of an RDD, which is a more likely scenario but would¶ be much less lethal than an IND, radioactive contamination¶ in a densely populated area could have serious economic and¶ social consequences. Although a successful RDD attack has¶ never been perpetrated, there’s evidence that terrorists have¶ invested in such devices: Chechen separatists were involved¶ in two incidents involving radioactive materials in November¶ 1995 and December 1998, and more recently intelligence¶ agencies in mainland Europe, Thailand, the UK and the US¶ have managed to foil RDD plots before they reached fruition. In 2012, the International Atomic Energy Agency (IAEA)¶ Incident and Trafficking Database reported 160 incidents¶ involving the illegal trade and movement of nuclear or other¶ radioactive material across national borders. Of those,¶ 17 involved possession and related criminal activities,¶ 24 involved theft or loss and 119 involved other unauthorised¶ activities. Two incidents involved highly enriched uranium¶ (HEU) in unauthorised activities. There were also three¶ incidents involving dangerous Category 1–3 radioactive¶ sources, two of which were thefts. Information reported to¶ the database demonstrates that:¶ • the availability of unsecured nuclear and other¶ radioactive material persists¶ • although effective border control measures help to¶ detect illicit trafficking, effective controls aren’t uniformly¶ implemented at all international border points¶ • individuals and groups are prepared to engage in¶ trafficking this material. The possibility of RDD or, worse, IND detonation is real and,¶ while the risks need to be kept in perspective, they need to be¶ taken seriously. One of the most worrying recent cases of illicit trafficking¶ involving HEU occurred in June 2011 in Moldova, where¶ officials arrested six people with a quantity of weapon-grade¶ material. The group claimed to have access to plutonium¶ and up to 9 kilograms of HEU, which they were willing to sell¶ for $31 million. A serious buyer, reportedly of North African¶ origin, appears to have been involved and remains at large. Research reactors are considered vulnerable to thefts of¶ nuclear and radiological materials because they’re often¶ located on university campuses or in larger scientific research¶ centres, which are relatively open to the public or have¶ many users and visitors. Moreover, other than the amended¶ Convention on the Physical Protection of Nuclear Material,¶ which has yet to enter into force, there’s no internationally¶ binding requirement for securing these facilities. Since¶ 2003, however, the US and the IAEA have been working¶ with various countries to reduce the risks associated with¶ research reactors. Many countries with HEU-fuelled research¶ reactors, including some in Australia’s near neighbourhood,¶ have taken part in securing HEU and converting the reactors¶ to use low-enriched uranium (LEU). In particular, HEU has¶ been removed and secured from Indonesia, the Philippines,¶ Thailand and, most recently, Vietnam. Of course, LEU-fuelled¶ research reactors remain a target for terrorists who wish¶ to spread ionising radiation or damage a symbolic facility¶ representing technological progress, and most research¶ reactors have substantial quantities of sealed sources that¶ are potentially vulnerable to theft. It only takes .001 of a stockpile to kill Harrell, Associate at the Project on Managing the Atom at Harvard University’s Belfer Center for Science and International Affairs, 3-24-14 [Eben, “We’re Not Prepared for a Nuclear Heist,” TIME, http://time.com/33802/were-notprepared-for-a-nuclear-heist/, 3-24-14] How did an 82-year-old nun come so close to getting her hands on highly enriched uranium?¶ In September 2009, a group of masked men armed with automatic weapons and explosives arrived on the roof of a cash depot in Vastberg, Sweden in a helicopter. The men blasted their way through a skylight and hoisted millions of dollars up to the hovering aircraft — the operation took less than 20 minutes. When police rushed to respond they discovered a bag with the word “bomb” at their heliport — a diversion planted by the thieves — and caltrops (road spikes) near the depot to slow down their response on the ground. While many of the thieves were caught after an investigation, most of the money was never recovered.¶ The Vastberg heist was not a nuclear event, but a new report from my colleagues at Harvard University makes the case that the incident should have deeply troubling implications for the leaders from over 50 countries convening in the Netherlands on March 24-25 for a summit on nuclear security. The stark truth is that many locations around the world that store highly enriched uranium (HEU) and plutonium — the essential ingredients of nuclear weapons — would not be able to repel an attack from adversaries using tactics and weapons as sophisticated as those used by the Vastberg thieves. An amount of plutonium that would fit in a soda can would be enough for terrorists to construct a crude nuclear bomb capable of reducing the heart of a major city to rubble (it wouldn’t require much HEU, either). Today, there are approximately 1440 tons of HEU and 500 tons of separated plutonium in hundreds of buildings in dozens of countries around the world; the theft of only .001 percent of this stockpile could lead to hundreds of thousands of deaths. Easy to access materials. Dahl, Reuters, 3-25-14 [Fredrik, “U.S. and Russia agree on nuclear terrorism threat - up to a point” http://www.reuters.com/article/2014/03/25/us-nuclear-security-summitidUSBREA2O12820140325] Since 1991, the number of countries with nuclear weapons-usable material has roughly halved from some 50.¶ However, more than 120 research and isotope production reactors around the world still use HEU for fuel or targets, many of them with "very modest" security measures, a Harvard Kennedy School report said this month.¶ "With at least two and possibly three groups having pursued nuclear weapons in the past quarter century, they are not likely to be the last," the report said.¶ Referring to a push to use low-enriched uranium (LEU) as fuel in research and other reactor types instead of HEU, the summit statement said: "We encourage states to continue to minimize the use of HEU through the conversion of reactor fuel from HEU to LEU, where technically and economically feasible.¶ "Similarly, we will continue to encourage and support efforts to use non-HEU technologies for the production of radio-isotopes, including financial incentives," it said.¶ An apple-sized amount of plutonium in a nuclear device and detonated in a highly populated area could instantly kill or wound hundreds of thousands of people, according to the Nuclear Security Governance Experts Group (NSGEG) lobby group.¶ But a so-called "dirty bomb" is seen as a more likely threat than an atomic bomb: conventional explosives are used to disperse radiation from a radioactive source, which can be found in hospitals or other places that may not be very well secured.¶ In December, Mexican police found a truck they suspected was stolen by common thieves and which carried a radioactive medical material that could have provided such an ingredient.¶ In another incident that put nuclear security in the spotlight and embarrassed U.S. officials, an elderly nun and two peace activists have admitted breaking into a Tennessee defense facility in 2012 where uranium for atomic bombs is stored. Yes Extinction – AT: No Risk Nuclear terrorism is probable – new report Burns, AP, 1-8-14 [Robert, “The Dangerous Weak Link in Nuclear Security,” http://www.realcleardefense.com/articles/2014/01/08/the_dangerous_weak_link_in_nuclear_s ecurity_107023.html] The number of countries possessing the makings of a nuclear bomb has dropped by almost onequarter over the past two years, but there remain "dangerous weak links" in nuclear materials security that could be exploited by terrorist groups with potentially catastrophic results, according to a study released Wednesday.¶ The study by the Nuclear Threat Initiative said Mexico, Sweden, Ukraine, Vietnam, Austria, the Czech Republic and Hungary have removed all or most of the weapons-usable nuclear materials on their territories since 2012.¶ That has reduced the number of countries with one kilogram or more of weapons-usable nuclear materials, such as highly enriched uranium, to 25 from 32 two years ago, the study said. The Nuclear Threat Initiative is a private, non-partisan group that advocates reducing the risk of the spread of nuclear weapons.¶ "That's a big deal," said Page Stoutland, vice president of the group's nuclear materials security program. "Getting rid of the materials is one less country where somebody could potentially steal weapons-usable material."¶ Among the 25 countries with weapons-usable nuclear materials, the study ranked Australia as having the best nuclear security arrangements, followed by Canada, Switzerland, Germany and Norway. The U.S. was ranked No. 11. The weakest nuclear security is in Israel, Pakistan, India, Iran and North Korea, according to the study, which assessed factors such as accounting methods, physical security and transportation security.¶ The drop in the number of countries possessing such materials could be seen as modestly encouraging for President Barack Obama's declared ambition to lock down all of the world's highly enriched uranium and plutonium -- the building blocks of a nuclear weapon. There are an estimated 1,400 tons of highly enriched uranium and almost 500 tons of plutonium stored in hundreds of sites around the world.¶ The report said a significant portion of these materials is poorly secured and vulnerable to theft or sale on the black market. Relatively small amounts of highly enriched uranium or plutonium are required to build a nuclear bomb, which is a declared ambition of terrorist groups such as al-Qaida.¶ "The result of a nuclear blast at the hands of terrorists or a rogue state would be catastrophic -with dire consequences that would stretch across the globe for economies, commerce, militaries, public health, the environment, civil liberties and the stability of governments," the report said.¶ The Obama goal, first proclaimed in 2009, will be the focus of a summit meeting of world leaders in the Netherlands in March. And although concern about the security of nuclear materials is generally directed at Iran, North Korea and Pakistan, the study released Wednesday said the United States has its own vulnerabilities.¶ It cited two recent incidents in the U.S. that point up imperfections in U.S. control of nuclear weapons materials, including a July 2012 break-in by anti-war protesters at the Y-12 complex in Oak Ridge, Tenn., that stores the nation's supply of weapons-grade uranium, makes nuclear warhead parts and provides nuclear fuel for the Navy.¶ The study by the Nuclear Threat Initiative also cited the firing in October of the No. 2 commander of U.S. Strategic Command, which is in charge of nuclear war planning and would operate nuclear weapons if a president ordered their use. Vice Adm. Tim Giardina was fired amid allegations of involvement with counterfeit gambling chips -- an allegation that raises questions about the potential corruption of nuclear secrets. Giardina has been under investigation by the Naval Criminal Investigative Service; results have not been released.¶ The Giardina matter, combined with the break-in at Oak Ridge, suggests that "it is dangerous and inappropriate" to take the security of U.S. nuclear materials for granted, the Nuclear Threat Initiative study said. Yes a threat. Chibarirwe, Trumpet, 7-7-13 [Anthony, “IAEA Chief Warns of Threat of Nuclear Terrorism” http://www.thetrumpet.com/article/10787.19.0.0/world/terrorism/iaea-chief-warns-of-threatof-nuclear-terrorism] At a conference on enhancing global nuclear security efforts, the director general of the United Nations International Atomic Energy Agency (iaea), Yukiya Amano, warned of the possibility of terrorist attacks involving radioactive material. The conference, held at the organization’s headquarters in Vienna last Monday, was attended by over 1,300 delegates from 120 countries and 20 international and regional organizations. Amano’s chief concern was the potential use of a crude nuclear device—a “dirty bomb,” as it’s often called. Such a bomb may not necessarily be a weapon of “mass destruction” but rather of “mass disruption.” Experts believe dirty bombs are much more likely to be detonated than actual nuclear bombs because of the relative ease in obtaining radioactive materials. How serious is the threat of crude radioactive bombs? To answer that question, Amano referred to a foiled smuggling and trafficking incident in Moldova two years ago. The smugglers had tried to avoid detection by using special radiation shields, showing “a worrying level of knowledge.” The case ended well, but “unfortunately,” said Amano, “we cannot be sure if such cases are just the tip of the iceberg.” Every year, the iaea receives hundreds of reports of thefts and unauthorized activities involving radioactive materials. While there hasn’t yet been a terrorist attack involving nuclear bombs or dirty bombs, Amano cautioned: “[T]his must not lull us into a false sense of security. If a ‘dirty bomb’ is detonated in a major city, or sabotage occurs at a nuclear facility, the consequences could be devastating. The threat of nuclear terrorism is real, and the global nuclear security system needs to be strengthened in order to counter that threat.” George Moore, a senior iaea analyst from 2007 to 2012, noted that “many experts believe it’s only a matter of time before a dirty bomb or another type of radioactive dispersal device is used, with some expressing surprise that it hasn’t happened already.” The destruction and disruption that could be caused by dirty bombs can be seen in the fairly simple pressure cooker bombs that paralyzed Boston in April. As our article “Death by a Thousand Cuts” noted, the Boston bombing cost three lives as well as hundreds of millions of dollars. Makeshift radioactive bombs could be similarly costly. Cleaning up nuclear contamination could take months, and for some buildings, decontamination could be a greater challenge than to destroy and rebuild. As unpleasant as this reality is, the fact of the matter is that the world remains vulnerable to nuclear terrorism, and the United States, Britain and Israel face the greatest risk. These nations have enemies determined to destroy them, or at least cripple them structurally or economically. Some of these foes are undeterred by religion, morals or death. For some, what they perceive happening after death actually motivates them. [Tom note- Citing IAEA director general and SENIOR IAEA analyst] Yes Extinction – AT: Safeguards Even the 2010 Summit regulations fail- increased security and culture shift is key Harrell, Associate at the Project on Managing the Atom at Harvard University’s Belfer Center for Science and International Affairs, 3-24-14 [Eben, “We’re Not Prepared for a Nuclear Heist,” TIME, http://time.com/33802/were-notprepared-for-a-nuclear-heist/, 3-24-14] How did an 82-year-old nun come so close to getting her hands on highly enriched uranium?¶ In September 2009, a group of masked men armed with automatic weapons and explosives arrived on the roof of a cash depot in Vastberg, Sweden in a helicopter. The men blasted their way through a skylight and hoisted millions of dollars up to the hovering aircraft — the operation took less than 20 minutes. When police rushed to respond they discovered a bag with the word “bomb” at their heliport — a diversion planted by the thieves — and caltrops (road spikes) near the depot to slow down their response on the ground. While many of the thieves were caught after an investigation, most of the money was never recovered.¶ The Vastberg heist was not a nuclear event, but a new report from my colleagues at Harvard University makes the case that the incident should have deeply troubling implications for the leaders from over 50 countries convening in the Netherlands on March 24-25 for a summit on nuclear security. The stark truth is that many locations around the world that store highly enriched uranium (HEU) and plutonium — the essential ingredients of nuclear weapons — would not be able to repel an attack from adversaries using tactics and weapons as sophisticated as those used by the Vastberg thieves. An amount of plutonium that would fit in a soda can would be enough for terrorists to construct a crude nuclear bomb capable of reducing the heart of a major city to rubble (it wouldn’t require much HEU, either). Today, there are approximately 1440 tons of HEU and 500 tons of separated plutonium in hundreds of buildings in dozens of countries around the world; the theft of only .001 percent of this stockpile could lead to hundreds of thousands of deaths.¶ Categorizing nuclear terrorism as the gravest global security threat, President Obama convened the first biennial Nuclear Security Summit in 2010 as part of a fouryear goal to secure all vulnerable nuclear materials worldwide. By elevating the issue of nuclear security to the level of presidents and prime ministers, the summit process resulted in indisputable successes. Four years later, the report by Harvard points out, many countries have strengthened their rules and procedures for securing nuclear materials, and 13 countries eliminated all the HEU or separate plutonium on their soil entirely, including, thank god, Ukraine (you really don’t want HEU hanging around in a country on the verge of war). For these and other reasons, the summits have made the world a safer place.¶ Nonetheless, every country that still has nuclear weapons, plutonium or HEU has more to do to ensure these items are effectively and lastingly secured — including the United States. Some facilities still require physical enhancements, such as more armed guards, physical barriers, and so on. Others have only minimal protections against insiders stealing nuclear material or sabotaging facilities. In most cases, the biggest obstacle remains security culture. All the bells, whistles and hairtrigger seismic detectors in the world won’t make a difference if security personnel are not vigilant. The Harvard report quotes Eugene Habiger, former security czar at the U.S. Department of Energy: “good security is 20% hardware and 80% culture.”¶ In the U.S. in 2012, an 82-year old nun and two other peace protestors broke into Y-12, a facility in Tennessee that contains the world’s largest repository of highly enriched uranium (HEU) in metal form and until the incident was colloquially known as “the Fort Knox of HEU” for its state-of-the-art security equipment. The nun bypassed multiple intrusion-detection systems because faulty cameras had not been replaced and guards at the central alarm station had grown weary of manually validating sensors that produced frequent false alarms. When the protestors started hammering on the side of a building that contains enough HEU for hundreds of weapons, the guards inside assumed the noise was coming from construction workers that they had not been told were coming. She and her fellow protestors were eventually challenged by a single guard. Terror Adv – Yes Bioterror Terrorists could have bioweapons James Kirkup, 13 (Deputy Political Editor, 3-26-2013, "Biological attacks 'getting easier for terrorists'," Telegraph.co.uk, http://www.telegraph.co.uk/news/uknews/terrorism-in-theuk/9955007/Biological-attacks-getting-easier-for-terrorists.html, accessed 7/8/15, SM) Charles Farr, the Director of the Office for Security and Counter-Terrorism, said that extremists have ever greater access to the information and technology required to create and spread germ agents or other biological weapons. He spoke as an official assessment suggested that countering the threat to the UK from international terrorism is becoming harder and more expensive. The Home Office has published an annual report on its Contest counter-terrorism strategy, which warned that Islamic terrorist threats are now spread more widely across the world, requiring “very significant resources” to combat. The report showed that security officials and intelligence agencies believe that a priority for Britain is improving its ability to detect biological attacks, treat victims and decontaminate attack sites. “Biological will get easier from a terrorist point of view,” Mr Farr said. Related Articles Republican terrorists claim car bomb was meant for G8 summit 25 Mar 2013 MI5 chief to step down, Theresa May says 25 Mar 2013 Car bomb found near Lough Erne G8 venue 23 Mar 2013 Major terror attack on scale of 7/7 foiled every year in UK, police reveal 21 Mar 2013 Syria opposition demands protection from Patriot shield 26 Mar 2013 Factors facilitating such attacks include the availability of formulae and other information on the internet; increasing teaching of biological sciences at universities, and “greater availability of technology,” he said. Mr Farr, a former MI6 officer, declined to give further details of the threat, but the Home Office report hints at a range of new precautions. Last year, the Home Office began enforcing a new list of controlled biological agents to “ensure that dangerous pathogens and toxins that are required in important medical and scientific research are used and held securely.” Lessons learned from the security operations for the London Olympic Games have “informed the wider programme of planning for high impact biological attacks,” the report said. The Home Office report also said that British authorities continue to plan for a Mumbai-style attack by terrorist gunmen. In particular, the emergency services have been working on plans to treat and extract casualties from an attack scene even while violence continues. Details are secret, but it is believed that special teams of armed police officers and volunteer paramedics have been trained to operate under fire. Mr Farr also revealed that even as officials prepare for such attacks, the counter-terrorism budget is coming under pressure to make cuts. Security and intelligence agencies are having to “find savings” to fund the battle against al-Qaeda, he said. In some cases, that means reducing manpower. The warnings about the money available for counter-terrorism come as ministers discuss a Spending Review that is likely to impose more cuts on the Home Office budget after the next general election. Danny Alexander, the Chief Secretary to the Treasury, told the Daily Telegraph last week that the Home Office could not be spared cuts in the 2015/16 round. The Home Office report on British counterterrorism warned that the UK faces a more complicated and widespread threat, which is more costly to address. “The terrorist threats we face are now more diverse than before, dispersed across a wider geographical areas, and often in countries without effective governance,” it said. “This poses significant challenges to our national security and to the security and intelligence agencies and departments working on counter-terrorism: operating in these areas is difficult and dangerous, requires very significant resources and is complicated and at times made impossible by the breakdown of governance and law and order.” Mr Farr said that the changing nature of the threat puts new financial pressure on the Home Office and other agencies. “It takes more to do the same amount of counter-terrorism work,” he said. “We have to find savings.” He added: “Across the whole of the CT budget, which is in the region of £1 billion, you would expect to find some efficiency savings. Technology means that in some areas, you can do the same with fewer people.” The Home Office report also warned that British Muslims fighting in Syria’s civil war could return home to carry out terrorist attacks. 2ac Answers AT: T – Geography Domestic surveillance means surveillance of US citizens. Unegbu, Howard University JD candidate, 2013 [Cindy, 57 How. L.J. 433, “NOTE AND COMMENT: National Security Surveillance on the Basis of Race, Ethnicity, and Religion: A Constitutional Misstep” Lexis, accessed 7-6-15, TAP] Recently, the government has been granted a broad authority to monitor domestic individuals for purposes of national security without requiring any suspicion of criminal or terrorist activity. 73Link to the text of the note Many counterterrorism authorities have addressed monitoring procedures; 74Link to the text of the note however, two specific laws are gaining much criticism--the NCTC and [446] the FBI Domestic Investigations and Operations Guide (DIOG). These authorities are discussed and analyzed below. AT: Terror Talk No link, root cause, or epistemological problem with the aff – the aff does not replicate bias against Muslims or Middle Eastern communities BUT DOES solve based on statistics. Stabile, University of California Berkeley School of Law JD, 2014 [Emily, 102 Calif. L. Rev. 235, “COMMENT: Recruiting Terrorism Informants: The Problems with Immigration Incentives and the S-6 Visa” Lexis, accessed 7-12-15, TAP] Notably, the argument that Muslims and Middle Easterners are in the best position to provide accurate intelligence on terrorist activities within their respective communities risks fueling the government's conflation of those communities with terrorism. 122Link to the text of the note However, in analyzing how best to procure counterterrorism intelligence, it would be amiss not to recognize the FBI's and other law enforcement agencies' heavy focus on Muslim and Middle Eastern communities. This is largely due to most recognized foreign terrorist organizations being based out of the Middle East or having Islamic ties. 123Link to the text of the note Law enforcement efforts, immigration law, surveillance policies, and pre-9/11 incidents like the 1993 attack on the World Trade Center have categorized the typical terrorist as male, Middle Eastern, and devoutly Muslim. 124Link to the text of the note The reality is that even though recently immigrated Muslims and Middle Easterners have become synonymous with terrorism, terrorists come from various ethnicities, religions, and communities. 125Link to the text of the note While acknowledging and attempting not to replicate that stereotype, this Comment seeks to recommend ways to improve the relationship between law enforcement and potential terrorism informants who typically belong to the same religion or ethnicity as those they surveil. The government's focus on Muslim and Middle Eastern communities as potential breeding grounds for terrorist groups also directs the focus of this Comment. However, this Comment resists the broad characterization of these communities as prone to extremism and violence. In fact, a recent statistical analysis of terrorism activity after 9/11 discredits the stereotype that Muslims and Middle Easterners account for most of the terrorism within the United States. 126Link to the text of the note In total, the report found that U.S.-originated non-Muslims accounted for 107 post-9/11 plots while U.S.-originated Muslims accounted for 49. 127Link to the text of the note Conversely, the report found that cooperation with Muslim communities helped prevent 40 percent of all Al-Qaeda plots after 9/11. 128Link to the text of the note As the report notes, "[a] singular focus on Muslim terrorists is both bad for national security and civil society … . Numerous studies and experts have stated that there is no reliable [255] "terrorist profile.'" 129Link to the text of the note When compared to the actual threat posed by members of Muslim and Middle Eastern communities, then, the FBI's explicit target of Muslim and Middle Eastern communities is excessive. AT: Speaking for Others Representations are key to transform consciousness Spivak ’95 (Gayatari Chakravorty Spivak, a University Professor at Columbia University where she is a founding member of the school's Institute for Comparative Literature and Society, “Can the Subaltern Speak?” http://www.mcgill.ca/files/crclaw-discourse/Can_the_subaltern_speak.pdf, Published in December of ‘95 dawg, Accessed July 9th 2015, CMT) If this is, indeed, Deleuze’s argument, his articulation of it is problematic. Two senses of representation are being run together: representation as ‘speaking for’, as in politics, and representation as ‘re-presentation, as in art or philosophy. Since theory is also only ‘action’, the theoretician does not represent (speak for) the oppressed group. Indeed, the subject is not seen as a representative consciousness (one re-presenting reality adequately). These two senses of representation — within state formation and the law, on the one hand, and in subject-predication, on the other — are related but irreducibly discontinuous. To cover over the discontinuity with an analogy that is presented as a proof reflects again a paradoxical subject-privileging. ^12 Because ‘the person who speaks and acts… is always a multiplicity’, no ‘theorizing intellectual… [or] party or… union’ can represent ‘those who act and struggle’ (FD, p. 206)? These immense problems are buried in the differences between the ‘same’ words: consciousness and conscience (both conscience in French), representation and re-presentation. The critique of ideological subject-be effaced, as can the active theoretical practice of the ‘transformation of consciousness’. The banality of leftist intellectuals’ lists of self-knowing, politically canny subalterns stands revealed; representing them, the intellectuals represent themselves as transparent. If such a critique and such a project are not to be given up, the shifting distinction between representation within the state and political economy, on the one hand, and within the theory of the Subject, on the other, must not be obliterated. Let us consider the play of vertreten (‘represent’ in the first sense) and darstellen (‘represent’ in the second sense) in a famous passage in The Eighteenth Brumaire of Lous Bonaparte, where Marx touches on ‘class’ as a descriptive and transformative concept in a manner somewhat more complex than Althusser’s distinction between class instinct and class position would allow. AT: Legalism/Legal Reform Good The USA Freedom Act is a key component to providing civil liberties to all citizens Black ’15 (Edward J. Black, Mr. Black received his Bachelor of Arts degree from Muhlenberg College and his Juris Doctor degree from the American University Washington College of Law where he won honors in the area of international law, “Congress to Vote on Surveillance Reforms After Misuse”, HuffingtonPost.com, http://www.huffingtonpost.com/edward-j-black/congress-to-vote-onsurve_b_7342718.html, Published May 21 2015, Accessed July 8th 2015, CMT) The damage wrought by the government's overreach to the fundamental trust between tech companies and their users will be difficult to reverse, but it must start with reform of the mass surveillance programs and improved transparency and oversight. Fortunately, the Senate now has an opportunity to speak definitively on the future of the NSA's mass collection of metadata. A broad coalition of civil liberties groups, technology companies, and trade associations, including my own, have publicly agreed the USA FREEDOM Act is the right first step on the path towards reforming the U.S. government's surveillance practices. The USA FREEDOM Act ends the government's bulk collection of call records and includes substantial oversight and transparency mechanisms designed to ensure that domestic surveillance agencies and programs are held accountable. At its core, the bill requires government access to call data for intelligence purposes to be targeted and limited, rather than all-encompassing. USA FREEDOM also provides for a civil liberties advocate to appear before the secret FISA courts that authorize surveillance programs. Lastly, the bill allows companies that receive data requests from the NSA to combat misperceptions by reporting the kind and quantity of those requests with more detail, while respecting national security concerns over excessive disclosure. When dealing with secret law and intelligence authorities, there are inherent risks for overreach, as recognized in the recent appellate court decision regarding the bulk call records collection program. Pressure for, perhaps well-intentioned, but expansive interpretations of limited authorities are inevitable when law is made in the shadows. As such, there can never be enough light shed on such processes. While the USA FREEDOM Act does much to improve public oversight over the government's surveillance authorities, we would welcome further legislative efforts to strengthen the bill's transparency provisions and collection limitations. Notably, because the USA FREEDOM Act's primary goal is to provide reform and address privacy and civil liberties concerns, it explicitly does not include a mandate that companies retain user data for surveillance purposes. Such a requirement, if included by amendment or otherwise, would necessarily undermine the bill's reforms and pose further privacy and security risks to the public given the considerable secrecy surrounding surveillance practices. The United States must set an example in reforming its mass surveillance programs. The longer they remain intact, the greater the opportunity for other governments to cite them as justification for even more invasive programs with fewer checks and balances. Every day we wait leads to further erosions of civil liberties worldwide, and deepens the gulf between the tech industry and its users -with serious economic consequences. The Senate should pass the USA FREEDOM Act and take a critical first step toward preserving the public's civil liberties and restoring trust in both the tech sector and the U.S. government. That trust is necessary for both innovation and the sustained health of the Internet and all it offers citizens and businesses around the world. Legal reform is a successful part of American political culture McCann ’94 (Michael W. McCann, a professor of political science at the University of Washington, “Rights at Work: Pay Equity Reform and the Politics of Legal Mobilization”, Books.Google.com, https://books.google.com/books?id=WtoAayu603kC&printsec=frontcover#v=one page&q&f=false, Published June 25 1994, Accessed July 8th 2015, CMT) The first and perhaps most general factor that deserves recognition is the rich legacy of rightsbased legal reform within modern American political culture. As Scheingold has argued, “most Americans… are responsive to legal symbols… There is a strong current of belief in rights… We believe that politics is and should be conducted in accordance with patterns of rights and obligations” (1974:13; Haskell 1987; Minow 1990). This general legal consciousness was significantly deepened and expanded by the succession of social movements that, since the 1930s, demanded state support for new citizen rights. These movements included above all the battles for worker rights and the civil rights movement, followed by movements advancing the rights of women, the poor, the disabled, homosexuals, the elderly, and consumers, among others. Such struggles not only have benefited their specific constituencies in various degrees, but also in turn created new political openings for subsequent activism around pay equity and other rights (see Tarrow 1983). This is true in several ways. Reforms like the civil rights movement normalize social differences McCann ’94 (Michael W. McCann, a professor of political science at the University of Washington, “Rights at Work: Pay Equity Reform and the Politics of Legal Mobilization”, Books.Google.com, https://books.google.com/books?id=WtoAayu603kC&printsec=frontcover#v=one page&q&f=false, Published June 25 1994, Accessed July 8th 2015, CMT) Most obviously, such earlier movements provided the guiding normative logics for evolving rights claims by many long-marginalized citizens. This “revolution of rising entitlements,” as Daniel Bell once called it, has been driven in particular by claims about race- and gender-based discrimination (see Olson 1984:5–7). Activists whom I interviewed spoke of the enormous debt owed to the civil rights movement as a progressive consciousness raising experience in American history that prepared the way for later struggles. In fact, many activists pointed out that one of the first pay equity rights battles was the Memphis strike by black male sanitation workers in 1968, during which Martin Luther King was assassinated. The more important factor at the mass level, however, is that legal discourses about discrimination, segregation, equal rights, and the like had permeated the general public as well as workplace-specific environments for decades. As a result, officially sanctioned claims to equal rights have become part of everyday understandings and expectations among citizens to an increasingly significant degree.^10 National public opinion polls revealing widespread support for the pay equity idea, once it is explained as a remedy for sex discrimination, provide some confirmation for this claim. ^11 Legal reforms can change social relations for minorities Jolls ’15 (Christine Jolls, the Director of the Law and Economics Program at the National Bureau of Economic Research with a Ph.D in Economics from MIT,” Antidiscrimination Law’s Effects on Implicit Bias” law.yale.ed, http://www.law.yale.edu/documents/pdf/Faculty/Antidiscrimination_Laws_Effec ts.pdf, Last Revised March 31 2015, Accessed July 8th 2015, CMT) For purposes of the present paper, by contrast, the nature of the relationship between implicit bias and the kinds of decisions policed by antidiscrimination law is not important. This is so because the paper’s essential goal is to describe how existing antidiscrimination law – although it has been broadly criticized for not aiming at implicitly biased behavior in any significant way – nonetheless tends to have the effect of reducing implicit bias in important contexts. For this descriptive claim about the effects of current antidiscrimination law on implicit bias to be of interest, it is only necessary that implicit bias be correlated with some actual behavior that we might care about, whether or not this is behavior that antidiscrimination law can directly regulate. What was said just above establishes clearly that the first correlation exists. (Thus, for instance, the evidence suggests that implicit bias is linked to an individual’s general friendliness toward African-Americans or members of other targeted groups. While neither current antidiscrimination law nor any plausible reform of this law could directly regulate such general friendliness, it is nonetheless relevant to learn that existing antidiscrimination law reduces implicit bias and, thus, the pattern of general unfriendliness associated with such bias.) In contrast to the case of existing proposals for reforming antidiscrimination law, an important virtue of the project of this paper is that it is not necessary that implicit bias be correlated with the specific 16 behaviors – such as employment decisions, admissions to educational institutions, and membership or participation in voluntary organizations – that antidiscrimination law policies. Society is self-checking; implicit racism is eliminating itself through diversity (retag if needed) Jolls ’15 (Christine Jolls, the Director of the Law and Economics Program at the National Bureau of Economic Research with a Ph.D in Economics from MIT,” Antidiscrimination Law’s Effects on Implicit Bias” law.yale.ed, http://www.law.yale.edu/documents/pdf/Faculty/Antidiscrimination_Laws_Effec ts.pdf, Last Revised March 31 2015, Accessed July 8th 2015, CMT) Laws regulating discrimination in the workplace are a basic component of American antidiscrimination law and have been the site of many of the existing critiques of the failure of existing doctrines to target implicitly biased behavior.58 But, notwithstanding these critiques, even the simplest feature of such laws – prohibiting certain hiring, firing and promotion practices – will often have the effect of reducing the degree of implicit workplace bias through the simple mechanism of increasing workplace diversity.59 1. Social Science Evidence on the Effects of Diverse Populations A striking set of results in the social science literature on implicit bias demonstrates that diversity in the surrounding population will often shape and affect the degree of implicit bias individuals exhibit. The studies suggest that the others present in an individual’s environment can significantly reduce the degree of implicit bias as measured by the Implicit Association Test (IAT) described above. At a broader level, both these studies and the evidence discussed later in this Part demonstrate the way in which the environment in which individuals find themselves structures and affects the degree of implicit bias such individuals exhibit on the IAT and similar measures. One notable study of the effects of population make-up on implicit bias showed that individuals who were administered an inperson IAT by an African-American experimenter exhibited substantially less implicit racial bias than individuals who were 58 See supra notes 32-37 and accompanying text. 59 “Diversity” is used throughout this paper to refer to an increase in the representation of a traditionally underrepresented group. Theoretically such an increase could make a particular population less “diverse” if this specific population was not initially characterized by the general pattern of underrepresentation; but the usage here, which accords with popular usage, seems workable for purposes of this paper. 20 administered an in-person IAT by a white experimenter.60 In other words, subjects’ speed in categorizing black-unpleasant and whitepleasant (stereotypeconsistent) pairs was closer to their speed in categorizing black-pleasant and white-unpleasant (stereotypeinconsistent) pairs when an African-American experimenter was standing in front of the room than when a white experimenter was standing in front of the room. AT: Topicality The aff is topical – it meets its, domestic surveillance, curtail, and substantial. Stabile, University of California Berkeley School of Law JD, 2014 [Emily, 102 Calif. L. Rev. 235, “COMMENT: Recruiting Terrorism Informants: The Problems with Immigration Incentives and the S-6 Visa” Lexis, accessed 7-12-15, TAP] III. Limitations on the FBI's Use of Informants Cromitie demonstrates that the FBI lacks substantial restraints on how it recruits and uses informants. Currently, there are four restrictions on how the FBI recruits informants: (1) internal FBI limitations, (2) constitutional limitations, (3) the entrapment defense and the outrageous government conduct doctrine, and (4) enforcement of nondeportation agreements in plea bargains. Because these limitations have neither curtailed the FBI's mismanagement of informants nor ensured a high degree of accuracy in information obtained, these restrictions have failed to protect both the public from terrorism and informants from abuse. 156Link to the text of the note A. Attorney General Guidelines The Attorney General's Guidelines on FBI Confidential Human Sources 157Link to the text of the note ("Guidelines"), issued in 2006 by the Department of Justice, 158Link to the text of the note are agency guidelines, not regulations, and as such have no binding legal effect. 159Link to the text of the note [259] Much of the problem of FBI informant misuse stems from this fact. The Guidelines outline the rules the FBI should follow in undercover investigations involving informants, which include documenting new informants and recording agreements made. 160Link to the text of the note The Guidelines are also subject to review and modification by the Attorney General in accordance with federal laws, and are afforded great deference by the courts. 161Link to the text of the note The major problems with the Guidelines, however, are that they lack consequences, are not subject to judicial review, and are not followed by agents. 162Link to the text of the note While the Guidelines may have internal consequences 163Link to the text of the note for FBI agents who violate them, they have no meaningful effect beyond internal regulation and cannot be enforced by the public via judicial review. 164Link to the text of the note Judicial review for violations only occurs when criminal prosecutions reveal the FBI's activities in the investigation. 165Link to the text of the note However, the informants in these cases typically remain confidential, and any inquiry into their actions does not extend beyond the handling agent's conduct and the recruitment methods used. 166Link to the text of the note Evidence shows that in many cases, FBI agents fail to follow the Guidelines when recruiting and handling informants. A 2005 study conducted by the Department of Justice Office of the Inspector General found that the FBI did not provide enough support to agents to properly follow the pre-2006 Attorney General Guidelines Regarding the Use of Confidential Informants. 167Link to the text of the note In fact, noncompliance with the guidelines was a problem in 87 percent of the cases the Inspector General reviewed. In particular, agents failed to properly review the suitability of potential informants, properly document informants' illegal activities, and notify informants of their limitations. 168Link to the text of the note Given the high levels of noncompliance and agents' nearly unlimited discretion in extending immigration rewards, agent abuse is likely also high. [260] Immigration rewards appear only once in the Guidelines, yet this single reference exemplifies the impunity with which law enforcement procures informants. The Guidelines state that "no promises or commitments can be made, except by the United States Department of Homeland Security, regarding the alien status of any person or the right of any person to enter or remain in the United States." 169Link to the text of the note The Guidelines also note that informants should receive this information if and when they have any issues regarding immigration status. 170Link to the text of the note While acknowledging that FBI agents may only offer immigration benefits to informants pursuant to DHS's agreement, the Guidelines do not answer the questions raised by this arrangement. Unlike monetary rewards, for which the Guidelines establish a number of rules regarding proper payment procedures and conditions, 171Link to the text of the note it is not clear under what circumstances immigration rewards must be documented and whether they are subject to conditions similar to those of monetary rewards. Their brief appearance in the Guidelines shows the FBI's recognition of immigration benefits as a method to elicit informant cooperation, but details on their use are nonexistent. This absence of information indicates that agents may possess vast discretion when using immigration rewards to recruit informants. It also indicates that executing these rewards is ultimately in the hands of DHS. B. Constitutional Limitations In theory, both the Fourth Amendment and the Due Process Clause of the Fifth Amendment restrict the FBI's use of informants in terrorism investigations. However, neither Amendment has actually limited the Agency's recruitment tactics when dealing with subjects facing immigration-related pressures to serve as informants. The Fourth Amendment's prohibition against unreasonable searches and seizures 172Link to the text of the note does not offer any substantive restrictions on the FBI's use of informants in terrorist investigations. In criminal investigations where the Fourth Amendment does apply, it places few restrictions on the use of information gathered by informants. 173Link to the text of the note To obtain a warrant based on intelligence gathered by an informant, the information must be reliable in establishing the requisite probable cause. 174Link to the text of the note In matters of national security however, the search standard is less stringent than the probable cause standard [261] used in criminal investigations. 175Link to the text of the note In fact, the United States Supreme Court has never held that the Fourth Amendment applies to national security investigations. 176Link to the text of the note In particular, the Foreign Intelligence Surveillance Act of 1978 (FISA) 177Link to the text of the note shields federal agents from standard criminal warrant requirements when carrying out electronic surveillance and searches. The Foreign Intelligence Surveillance Court, a secret court 178Link to the text of the note created by FISA to issue warrants in national security investigations, 179Link to the text of the note only requires probable cause that "the target of the electronic surveillance is a foreign power or an agent of a foreign power." 180Link to the text of the note Hence, because agents do not have to produce evidence of criminal activity before initiating electronic or physical surveillance, they are able to use informants more freely. 181Link to the text of the note Under FISA, the Attorney General can also authorize surveillance for up to a year without court order. 182Link to the text of the note Furthermore, in 1982, President Reagan's Executive Order No. 12,333 identified the FBI as the primary gatherer of domestic intelligence and held that the Attorney General holds the power to carry out warrantless searches and surveil agents of foreign powers. 183Link to the text of the note Executive Order No. 12,333 essentially paved the way for the FBI's use of informants to conduct domestic surveillance of foreign agents, including members of foreign terrorist organizations, without [262] adhering to the restrictions inherent in the use of informants in domestic criminal investigations. In domestic criminal investigations, agents are required by law to corroborate informants' intelligence and credibility before a warrant is issued. 184Link to the text of the note However, under Executive Order No. 12,333, this corroboration is not required in terrorism investigations. 185Link to the text of the note For informants facing deportation and immense pressure to cooperate, these lax warrant requirements remove an important check on the validity of their intelligence. The requirements also give the FBI more opportunities to abuse its power. Although no court has explicitly found Executive Order No. 12,333 constitutional, no court has found it unconstitutional and thus it remains good law. Indeed, the Northern District of Illinois found that FBI reliance on the Order in conducting physical searches for foreign intelligence gathering was reasonable. 186Link to the text of the note AT: S-6 Reform CP – No Solvency – Entrapment CP doesn’t solve the entrapment internal link – it still results in the false production of intelligence because it provides an incentive for intelligence. Stabile, University of California Berkeley School of Law JD, 2014 [Emily, 102 Calif. L. Rev. 235, “COMMENT: Recruiting Terrorism Informants: The Problems with Immigration Incentives and the S-6 Visa” Lexis, accessed 7-12-15, TAP] The examples discussed supra in Part II illustrate how the overbroad and indiscriminate use of informants, particularly those recruited with immigration threats or rewards, harms the acquisition of useful information, fails to identify and protect against legitimate threats, chills speech, and encourages ethnic and religious profiling. Immigration law offers less protection to informants than promises of leniency in criminal matters, thus increasing the potential for informants to produce faulty intelligence. Part III, supra, demonstrates that limitations on FBI dealings with informants are practically nonexistent. AT: S-6 Visa Reform CP – No Solvency – Circumvention No solvency – circumvention. Stabile, University of California Berkeley School of Law JD, 2014 [Emily, 102 Calif. L. Rev. 235, “COMMENT: Recruiting Terrorism Informants: The Problems with Immigration Incentives and the S-6 Visa” Lexis, accessed 7-12-15, TAP] Reports indicate that no S-6 visas were issued to terrorism informants between 1994 and 2006. 252Link to the text of the note There is also no indication of how many S-6 visas, if any, were processed during this time. The lack of incentives for the FBI to apply for S-6 visas on behalf of informants may be responsible for this. That is, while the prospect of legal permanent residency may be tempting bait for the FBI to dangle in front of potential informants, the bureaucratic process involved in obtaining an S-6 visa is discouraging. 253Link to the text of the note Hence, while the FBI may tout S-6 visas to potential informants, the use of coercive and unapproved [271] threats of deportation is more likely to result in cooperation - with less time, effort, and oversight. Since informants waive their recourses in S-6 visa agreements, the FBI suffers no legal backlash when it fails to fulfill promises made to them. 254Link to the text of the note Essentially, the potential benefits of using the S-6 visa are outweighed by the lengthy process involved, especially if the FBI can circumvent the process or break its promises. In the end, the FBI has no real reason to seek an S-6 visa for an informant. AT: S-6 Visa Reform CP – No Solvency The CP is insufficient to solve – too narrow to solve the aff. Stabile, University of California Berkeley School of Law JD, 2014 [Emily, 102 Calif. L. Rev. 235, “COMMENT: Recruiting Terrorism Informants: The Problems with Immigration Incentives and the S-6 Visa” Lexis, accessed 7-12-15, TAP] Changing the S-6 visa program and focusing on the FBI's use of immigration incentives to recruit informants may seem too narrow to appreciably influence national security and community relations. However, the point of this Comment is a narrow one: to showcase one problematic aspect in the way the FBI handles human intelligence. The recommendations here would not fully solve the problems of privacy violations, ethnic and religious profiling, and informant misuse. The use of immigration law and status to leverage informants is not the only way that the FBI recruits informants, and the S-6 visa program would likely remain relatively small even if expanded. However, as previously explained, the proposed changes to the S-6 visa would generate a more transparent system and more fruitful intelligence, and would help ensure the FBI operates within the scope of its power. Individuals pressured to provide intelligence information would have a legitimate chance to receive an S-6 visa, and the FBI would have a greater incentive to stop its overtly coercive recruitment tactics such as deportation threats. AT: Race K – No Root Cause The 1AC is a prerequisite to the alternative – the 1AC posits a critique of the national security state that is a better starting point and explanation for the current manifestations of the impact of the K than the alternative. Kundnani, New York University media culture and communication professor, and Kumar, Rutgers University media studies and Middle East studies professor, 2015 [Arun and Deepa, “Race, surveillance, and empire” http://isreview.org/issue/96/racesurveillance-and-empire, accessed 7-11-15, TAP] The election of Barack Obama as president in 2008 was said to have ushered in a new “postracial” era, in which racial inequalities were meant to be a thing of the past. African Americans and Muslim Americans placed their hopes in Obama, voting for him in large numbers. But in the so-called post-racial era, the security narrative of hard-working families (coded white) under threat from dangerous racial others has been as powerful as ever. The unprecedented mass deportation of more than two million people during the Obama presidency is one form taken by this post-racial racialized securitization. Over the last two decades, the progressive criminalization of undocumented immigrants has been achieved through the building of a militarized wall between Mexico and the United States, hugely expanding the US border patrol, and programs such as Secure Communities, which enables local police departments to access immigration databases. Secure Communities was introduced in 2008 and stepped up under Obama. It has resulted in migrants being increasingly likely to be profiled, arrested, and imprisoned by local police officers, before being passed to the federal authorities for deportation. Undocumented migrants can no longer have any contact with police officers without risking such outcomes. There is an irony in the way that fears of “illegal immigration” threatening jobs and the public purse have become stand-ins for real anxieties about the neoliberal collapse of the old social contract: the measures that such fears lead to—racialization and criminalization of migrants—themselves serve to strengthen the neoliberal status quo by encouraging a precarious labor market. Capital, after all, does not want to end immigration but to profit from “a vast exploitable labor pool that exists under precarious conditions, that does not enjoy the civil, political and labor rights of citizens and that is disposable through deportation.”66 What brings together these different systems of racial oppression—mass incarceration, mass surveillance, and mass deportation—is a security logic that holds the imperial state as necessary to keeping “American families” (coded white) safe from threats abroad and at home. The ideological work of the last few decades has cultivated not only racial security fears but also an assumption that the security state is necessary to keep “us” safe. In this sense, security has become the new psychological wage to aid the reallocation of the welfare state’s social wage toward homeland security and to win support for empire in the age of neoliberalism. Through the notion of security, social and economic anxieties generated by the unraveling of the Keynesian social compact have been channeled toward the Black or Brown street criminal, welfare recipient, or terrorist . In addition, as Susan Faludi has argued, since 9/11, this homeland in need of security has been symbolized, above all, by the white domestic hearth of the prefeminist fifties, once again threatened by mythical frontier enemies, hidden subversives, and racial aggressors. That this idea of the homeland coincides culturally with “the denigration of capable women, the magnification of manly men, the heightened call for domesticity, the search for and sanctification of helpless girls” points to the ways it is gendered as well as racialized.67 AT: Race K – Binaries DA/Coalitions Good The alternative doesn’t solve the case – the alternative reifies the black white binary which is inadequate in addressing the modern surveillance regime. Kundnani, New York University media culture and communication professor, and Kumar, Rutgers University media studies and Middle East studies professor, 2015 [Arun and Deepa, “Race, surveillance, and empire” http://isreview.org/issue/96/racesurveillance-and-empire, accessed 7-11-15, TAP] Better oversight of the sprawling national security apparatus and greater use of encryption in digital communication should be welcomed. But by themselves these are likely to do little more than reassure technologists, while racialized populations and political dissenters continue to experience massive surveillance. This is why the most effective challenges to the national security state have come not from legal reformers or technologists but from grassroots campaigning by the racialized groups most affected. In New York, the campaign against the NYPD’s surveillance of Muslims has drawn its strength from building alliances with other groups affected by racial profiling: Latinos and Blacks who suffer from hugely disproportionate rates of stop and frisk. In California’s Bay Area, a campaign against a Department of Homeland Security-funded Domain Awareness Center was successful because various constituencies were able to unite on the issue, including homeless people, the poor, Muslims, and Blacks. Similarly, a demographics unit planned by the Los Angeles Police Department, which would have profiled communities on the basis of race and religion, was shut down after a campaign that united various groups defined by race and class. The lesson here is that, while the national security state aims to create fear and to divide people, activists can organize and build alliances across race lines to overcome that fear. To the extent that the national security state has targeted Occupy, the antiwar movement, environmental rights activists, radical journalists and campaigners, and whistleblowers, these groups have gravitated towards opposition to the national security state. But understanding the centrality of race and empire to national security surveillance means finding a basis for unity across different groups who experience similar kinds of policing: Muslim, Latino/a, Asian, Black, and white dissidents and radicals. It is on such a basis that we can see the beginnings of an effective multiracial opposition to the surveillance state and empire. AT: Race K – Perm & AT: Legalism/Colorblindness The aff may be colorblind BUT the permutation solves – the alternative is not to reject legal reform but to understand that legal reform alone isn’t enough. This answers colorblindness AND legalism. Kundnani, New York University media culture and communication professor, and Kumar, Rutgers University media studies and Middle East studies professor, 2015 [Arun and Deepa, “Race, surveillance, and empire” http://isreview.org/issue/96/racesurveillance-and-empire, accessed 7-11-15, TAP] Better oversight of the sprawling national security apparatus and greater use of encryption in digital communication should be welcomed. But by themselves these are likely to do little more than reassure technologists, while racialized populations and political dissenters continue to experience massive surveillance. This is why the most effective challenges to the national security state have come not from legal reformers or technologists but from grassroots campaigning by the racialized groups most affected. In New York, the campaign against the NYPD’s surveillance of Muslims has drawn its strength from building alliances with other groups affected by racial profiling: Latinos and Blacks who suffer from hugely disproportionate rates of stop and frisk. In California’s Bay Area, a campaign against a Department of Homeland Security-funded Domain Awareness Center was successful because various constituencies were able to unite on the issue, including homeless people, the poor, Muslims, and Blacks. Similarly, a demographics unit planned by the Los Angeles Police Department, which would have profiled communities on the basis of race and religion, was shut down after a campaign that united various groups defined by race and class. The lesson here is that, while the national security state aims to create fear and to divide people, activists can organize and build alliances across race lines to overcome that fear. To the extent that the national security state has targeted Occupy, the antiwar movement, environmental rights activists, radical journalists and campaigners, and whistleblowers, these groups have gravitated towards opposition to the national security state. But understanding the centrality of race and empire to national security surveillance means finding a basis for unity across different groups who experience similar kinds of policing: Muslim, Latino/a, Asian, Black, and white dissidents and radicals. It is on such a basis that we can see the beginnings of an effective multiracial opposition to the surveillance state and empire. AT: K - General – Social Death Social death can only be understood in the context of surveillance – the condition for the possibility of non-human was the rise of the surveillance state – the 1ac is a necessary starting point for understanding the K, not the alt. Kundnani, New York University media culture and communication professor, and Kumar, Rutgers University media studies and Middle East studies professor, 2015 [Arun and Deepa, “Race, surveillance, and empire” http://isreview.org/issue/96/racesurveillance-and-empire, accessed 7-11-15, TAP] National security surveillance is as old as the bourgeois nation state, which from its very inception sets out to define “the people” associated with a particular territory, and by extension the “non-peoples,” i.e., populations to be excluded from that territory and seen as threats to the nation. Race, in modern times, becomes the main way that such threats—both internal and external—are mediated; modern mechanisms of racial oppression and the modern state are born together. This is particularly true of settler-colonial projects, such as the United States, in which the goal was to territorially dispossess Indigenous nations and pacify the resistance that inevitably sprang up. In this section, we describe how the drive for territorial expansion and the formation of the early American state depended on an effective ideological erasure of those who peopled the land. Elaborate racial profiles, based on empirical “observation”—the precursor to more sophisticated surveillance mechanisms—were thus devised to justify the dispossession of native peoples and the obliteration of those who resisted. AT: K – General – No Root Cause The critique does not solve the root cause of the modern surveillance state – the history of surveillance is far more complex than the reductionist view of the alternative – that means it fails to solve the case – national security is the most accurate historical explanation of the modern surveillance state. This card EXPLICITLY says whiteness was not the reason for the creation of the modern surveillance state. This card also says the KKK was targeted by surveillance – the K likely cannot explain that. Kundnani, New York University media culture and communication professor, and Kumar, Rutgers University media studies and Middle East studies professor, 2015 [Arun and Deepa, “Race, surveillance, and empire” http://isreview.org/issue/96/racesurveillance-and-empire, accessed 7-11-15, TAP] By 1890, coast-to-coast colonization was effectively complete, with the surviving Native American population consigned to reservations. Thereafter, the priority became the projection of US power further afield, again justified through a racialized understanding of American exceptionalism. As Paul Kramer writes in the context of the US conquest of the Philippines: [T]he war’s advocates subsumed US history within longer, racial trajectories of “Anglo-Saxon” history which folded together US and British imperial histories. The Philippine-American War, then, was a natural extension of Western conquest, and both taken together were the organic expression of the desires, capacities, and destinies of “Anglo-Saxon” peoples. Americans, as AngloSaxons, shared Britons’ racial genius for empire-building, a genius which they must exercise for the greater glory of the “race” and to advance “civilization” in general. Unlike other races, they “liberated” the peoples they conquered; indeed, their expressions of conquest as “freedom” proliferated as the terrors they unleashed became more visible.31 The resistance that Filipinos mounted to American benevolence could then only be seen as an atavistic barbarism to be countered through modern techniques of surveillance and repression. While local police departments within the United States had begun to develop techniques of political surveillance, it was under the US colonial regime in the Philippines that systematic and widespread surveillance of political opponents and the manipulation of personal information as a form of political control was first institutionalized. A unit within the police called the Constabulary Information Section was established in Manila in 1901, founded by Henry Allen, a former military attaché to Tsarist Russia.32 The Constabulary Information Section cultivated hundreds of paid Filipino agents across the country, making it “scarcely possible for seditionary measures of importance to be hatched without our knowledge,” as Allen wrote to President Theodore Roosevelt.33 The techniques of compiling dossiers on dissidents’ private lives, spreading disinformation in the media, and planting agents provocateurs among militants were applied to combating radical nationalist groupings in Manila. Control over information proved as effective a tool of colonial power as physical force. As historian Alfred W. McCoy notes, during World War I police methods that had been tested and perfected in the colonial Philippines migrated homeward to provide both precedents and personnel for the establishment of a US internal security apparatus.… After years of pacifying an overseas empire where race was the frame for perception and action, colonial veterans came home to turn the same lens on America, seeing its ethnic communities . . . as internal colonies requiring coercive controls.34 On this basis, a domestic national security apparatus emerged, with notions of race and empire at its core. From 1917, the FBI and police department red squads in US cities increasingly busied themselves with fears of subversion from communists, pacifists, anarchists, and the ten million German Americans who were suspected of harboring disloyalties. During World War I, thirty million letters were physically examined and 350,000 badgecarrying vigilantes snooped on immigrants, unions, and socialists.35 Concerns over privacy set limits to such surveillance after the war, but with increasing left-wing and right-wing radicalization in the 1930s, President Roosevelt decided to issue a secret executive order that authorized a shift in the FBI’s role from a narrowly conceived law enforcement agency focused on gathering evidence for criminal prosecutions into an intelligence agency. Thereafter, it was dedicated to spying on “subversive” political movements (primarily communists, but also fascists) and countering their ability to influence public debate. This meant the FBI systematically identifying subversives based on “ideological and associational criteria.”36 It also opened the door to the burgeoning counter-subversion practices that the bureau would launch over the following decades. Already during World War II, the FBI was collecting detailed files on suspected communists while Black organizations such as the National Association for the Advancement of Colored People and the Nation of Islam were also surveillance targets.37 At the end of the Second World War, the United States emerged as one of two superpowers on the world stage. Pushing back against the isolationists, Cold War liberals made the case for the establishment of a permanent national security state. According to historian Paul Hogan, the national security mindset that emerged involved a conviction that a new era of total war had dawned on the United States. In total war, the battle was not confined to the front lines but extended to the home front as well, as did the awesome destruction that modern weapons could inflict not only on military combatants but also on industry, urban centers, and civilian populations. Modern war was total war in this sense that modern armies depended on the output of citizen soldiers in farms and factories behind the battle line. In total war all of the nation’s resources and all of its energy and talent had to be mobilized on behalf of the war effort, thereby obliterating the old distinction between civilian and military, between citizen and soldier, between home front and the front line. When American leaders talked about total war they did so in these terms and also in terms that recognized that modern weapons could bring massive destruction from great distances with barely a moment’s notice. In the new age, American leaders would no longer have the time to This was an updating and reworking of the settler-colonial mentality, with the notion of Manifest Destiny being explicitly drawn on in making the case for an exceptional American empire. The notion of the “citizen-soldier” was built upon earlier settler-colonial racialized security narratives. However, American exceptionalism, as it emerged in this period, was based on the premise that the United States was not only unique among other nations and therefore destined to play a leading global role, but also a nation built upon liberal principles. This meant that the centrality of whiteness to the security debate the issue of war or peace or to prepare at a slow pace.38 narrative was muted and less prominent. Even though the white middle-class home was cast as the locus of a privatized notion of self-defense and military preparedness through government civil defense policies and programs,39 the image of the US empire was one of liberalism, inclusivity, and the “melting pot.” The United States sought quite consciously to differentiate itself from past empires as it positioned itself to be one of two hegemons on the global stage. In this context, the existence of Jim Crow segregation was an embarrassment for the ruling class. In 1947, the National Security Act was passed which entrenched “security” as a key element of the postwar order. Every aspect of life—the social, political, intellectual, and economic—was conceived as playing a role in national defense, and a massive security establishment was built up. The 1947 act created the Office of the Secretary of Defense, the Joint Chiefs of Staff, the National Security Council (NSC), and the Central Intelligence Agency (CIA). The National Security Agency (NSA) was formed in 1952, conceived as an organization to carry out the gathering of “signals intelligence.” there was also the integration of corporate America, of universities, of research institutions, and of the media into the machinery of the national security state. The earlier distinctions between the citizen and soldier and between the home front and the battle front were blurred to shore up an imperial system at home and abroad. Surveillance was central to During this period, sustaining and reproducing this system. From the 1940s to the early 1970s, FBI wiretapping and bugging operations focused on a wide range of movements, activists, and public figures. The following list of targets compiled by historian Athan Theoharis gives a flavor of the surveillance and is worth quoting in full: Radical activists (David Dallin, Charles Malamuth, C. B. Baldwin, Frank Oppenheimer, Bertolt Brecht, Thomas Mann, Heinrich Mann, Helene Weigel, Berthold Viertel, Anna Seghers, Bodo Uhse, Richard Criley, prominent liberal and radical attorneys (Bartley Crum, Martin Popper, Thomas Corcoran, David Wahl, Benjamin Margolis, Carol King, Robert Silberstein, National Lawyers Guild, Fred Black), Radical labor leaders and unions (Harry Bridges; United Auto Workers; National Frank Wilkinson), Maritime Union; National Union of Marine Cooks and Stewards; United Public Workers; United Electrical Radio and Machine Workers; Food, Tobacco, Agricultural and Allied Journalists (I. F. Stone, Philip Jaffe, Kate Mitchell, Mark Gayn, Leonard Lyons, William Beecher, Marvin Kalb, Henry Brandon, Hedrick Smith, Lloyd Norman, Hanson Baldwin, Inga Arvad), Civilrights activists and organizations (Martin Luther King, Jr.; Malcolm X; Southern Christian Leadership Conference; National Association for the Workers; International Longshoremen’s and Warehousemen’s Union; CIO Maritime Committee; Congress of Industrial Organizations Council), Advancement of Colored People; March on Washington Movement; Gandhi Society for Human Rights; Elijah Muhammad; Nation of Islam; Stokely Carmichael; H. Rap Brown; Student Non-Violent Coordinating Committee; Alabama Peoples Education Association; Committee to Aid the Monroe Defendants; Southern Conference for Human Welfare; Black Panther Party; Universal Negro Improvement Association; African Liberation Day Committee), The Students for a Democratic Society, Ku Klux Klan, National Committee to Abolish HUAC, Socialist Workers Party, Washington Bookstore Association, Northern California Association of Scientists, Federation of American Scientists, American Association of Scientific Workers, pre–World War II isolationists (Henry Grunewald, Ethel Brigham, John O’Brien, Lillian Moorehead, Laura Ingalls, America First, Jehovah’s Witnesses, Los Angeles Chamber of Commerce), and even prominent personalities (Joe Namath, Harlow Shapley, Edward Condon, Edward Prichard, Muhammad Ali, Benjamin Spock).40 In a bid to shape public opinion, the FBI also launched a mass media campaign in 1946 that released “educational materials” to In the late 1950s, the FBI launched its secret counterintelligence program (COINTELPRO), which used provocateurs and informants to infiltrate communist groups initially, but later widened to include Puerto Rican nationalists, the student movement, the civil rights movement, and Black liberation movements. About 1,500 of the 8,500 American Communist Party members were likely FBI informants in the early 1960s. By the end of the decade, agents who had previously worked in US foreign intelligence were transferring to the burgeoning field of domestic intelligence to spy on radical movements, whether employed by the bureau, military intelligence, or the expanding red squads in local police departments.41 A key part of the FBI’s countersubversion strategy was the manipulation of political activists into committing criminal acts so that they could be arrested and prosecuted. Agents provocateurs working for the FBI cooperative journalists and legislators. initiated disruptions of meetings and demonstrations, fights between rival groups, attacks on police, and bombings. FBI agents also secretly distributed derogatory and scurrilous In an attempt to “neutralize” Martin Luther King, Jr., who, the FBI worried, might abandon his “obedience to white liberal doctrines” (as indeed he did), he was placed under intense surveillance, and attempts were made to destroy his marriage and induce his suicide. In various cities, the FBI and local police used fake letters and informants to stir up violence between rival factions and gangs to disrupt the Black Panther Party.43 In a number of cases, police departments or federal agents carried out the direct assassination of Black Panthers.44 material to police, Congress, elected officials, other federal agencies, and the mass media.42 Terror DA Answers AT: Terror DA – Link Not True View the link to the Terror DA through a skeptical lens – any “success stories” were rigged by the FBI. Stabile, University of California Berkeley School of Law JD, 2014 [Emily, 102 Calif. L. Rev. 235, “COMMENT: Recruiting Terrorism Informants: The Problems with Immigration Incentives and the S-6 Visa” Lexis, accessed 7-12-15, TAP] Many argue that tactics like recruiting informants through immigration law and surveilling mosques are necessary to prevent terrorist attacks, and that national security must be the nation's top priority, whatever the cost. These arguments fail to recognize that when informants lack a specific target and direction, the gathered intelligence does not necessarily enhance the nation's security. Instead, the FBI - with little concern for the actual gravity of the original threat posed by the suspect - creates an elaborate terrorism plot for the surveillance targets to participate in. 100Link to the text of the note After 9/11, many individuals who showed no signs of violence or extremism prior to involvement with informants and government-created plots have been prosecuted under terrorism charges. 101Link to the text of the note Until the informants provided the means, these individuals did not have the finances or the proper connections to conceive and carry out these terrorism plans. Although orchestrating these plots makes the FBI's preventative stance appear successful in the public eye, it diverts law enforcement resources from focusing on real targets. AT: Terror DA Racial, ethnic, and religious profiling fails – entrapment produces fabricated information. Stabile, University of California Berkeley School of Law JD, 2014 [Emily, 102 Calif. L. Rev. 235, “COMMENT: Recruiting Terrorism Informants: The Problems with Immigration Incentives and the S-6 Visa” Lexis, accessed 7-12-15, TAP] Since the FBI's post-9/11 establishment of a preventative stance toward terrorism has increased the need for intelligence, the agency has turned to the increased use of immigration law to recruit additional confidential informants. Using the threat of immigration consequences - particularly deportation - to produce terrorism intelligence presents novel problems for both the intelligence gathering process and the informants. Informants recruited in this manner who also lack established ties to foreign terrorist organizations have an enormous incentive to fabricate information to fulfill their end of the agreement and avoid deportation. Recruiting informants via immigration law also affords less protection than recruiting them by offering monetary rewards or reductions in sentencing. Furthermore, the FBI's recruitment tactics encourage ethnic and religious profiling, alienating Muslim and Middle Eastern communities. Although Congress created the S-6 visa classification specifically to induce cooperation from informants in terrorism investigations, the visa is rarely used due to its stringent eligibility requirements for informants. In order for law enforcement to successfully use the S-6 visa program and to encourage the trust of and cooperation from informants, legislative overhaul is needed. An S-6 visa program that emphasizes pre-existing ties to terrorist organizations, increases the availability of S-6 visas, and lowers the barriers to the visas' use will produce counterterrorism intelligence that is more reliable and actionable and provide greater protection for civil liberties and to informants themselves. Mass Surveillance Fail Mass surveillance is fundamentally ineffective at preventing terrorism – three reasons Schneier 15 (Bruce. Bruce Schneier is a renowned security and cryptology technologist, a fellow at the Berkman Center for Internet and Society at Harvard Law School, a program fellow at the New America Foundation's Open Technology Institute, a board member of the Electronic Frontier Foundation, an Advisory Board Member of the Electronic Privacy Information Center, and the Chief Technology Officer at Resilient Systems, Inc. He has testified before Congress and is the author of Data and Goliath. 3-24-2015. “Why Mass Surveillance Can’t, Won’t And Never Has Stopped A Terrorist”. The Daily Digg. http://digg.com/2015/why-mass-surveillance-cant-wont-and-never-has-stoppeda-terrorist. Accessed 7-9-2015. KC) Data mining is offered as the technique that will enable us to connect those dots. But while corporations are successfully mining our personal data in order to target advertising, detect financial fraud, and perform other tasks, three critical issues make data mining an inappropriate tool for finding terrorists. The first, and most important, issue is error rates. For advertising, data mining can be successful even with a large error rate, but finding terrorists requires a much higher degree of accuracy than data-mining systems can possibly provide. Data mining works best when you’re searching for a well-defined profile, when there are a reasonable number of events per year, and when the cost of false alarms is low. Detecting credit card fraud is one of data mining’s security success stories: all credit card companies mine their transaction databases for spending patterns that indicate a stolen card. There are over a billion active credit cards in circulation in the United States, and nearly 8% of those are fraudulently used each year. Many credit card thefts share a pattern — purchases in locations not normally frequented by the cardholder, and purchases of travel, luxury goods, and easily fenced items — and in many cases data-mining systems can minimize the losses by preventing fraudulent transactions. The only cost of a false alarm is a phone call to the cardholder asking her to verify a couple of her purchases. Similarly, the IRS uses data mining to identify tax evaders, the police use it to predict crime hot spots, and banks use it to predict loan defaults. These applications have had mixed success, based on the data and the application, but they’re all within the scope of what data mining can accomplish. Terrorist plots are different, mostly because whereas fraud is common, terrorist attacks are very rare. This means that even highly accurate terrorism prediction systems will be so flooded with false alarms that they will be useless. The reason lies in the mathematics of detection. All detection systems have errors, and system designers can tune them to minimize either false positives or false negatives. In a terroristdetection system, a false positive occurs when the system mistakenly identifies something harmless as a threat. A false negative occurs when the system misses an actual attack. Depending on how you “tune” your detection system, you can increase the number of false positives to assure you are less likely to miss an attack, or you can reduce the number of false positives at the expense of missing attacks. Because terrorist attacks are so rare, false positives completely overwhelm the system, no matter how well you tune. And I mean completely: millions of people will be falsely accused for every real terrorist plot the system finds, if it ever finds any. We might be able to deal with all of the innocents being flagged by the system if the cost of false positives were minor. Think about the full-body scanners at airports. Those alert all the time when scanning people. But a TSA officer can easily check for a false alarm with a simple pat-down. This doesn’t work for a more general data-based terrorism-detection system. Each alert requires a lengthy investigation to determine whether it’s real or not. That takes time and money, and prevents intelligence officers from doing other productive work. Or, more pithily, when you’re watching everything, you’re not seeing anything. The US intelligence community also likens finding a terrorist plot to looking for a needle in a haystack. And, as former NSA director General Keith Alexander said, “you need the haystack to find the needle.” That statement perfectly illustrates the problem with mass surveillance and bulk collection. When you’re looking for the needle, the last thing you want to do is pile lots more hay on it. More specifically, there is no scientific rationale for believing that adding irrelevant data about innocent people makes it easier to find a terrorist attack, and lots of evidence that it does not. You might be adding slightly more signal, but you’re also adding much more noise. And despite the NSA’s “collect it all” mentality, its own documents bear this out. The military intelligence community even talks about the problem of “drinking from a fire hose”: having so much irrelevant data that it’s impossible to find the important bits. We saw this problem with the NSA’s eavesdropping program: the false positives overwhelmed the system. In the years after 9/11, the NSA passed to the FBI thousands of tips per month; every one of them turned out to be a false alarm. The cost was enormous, and ended up frustrating the FBI agents who were obligated to investigate all the tips. We also saw this with the Suspicious Activity Reports — or SAR — database: tens of thousands of reports, and no actual results. And all the telephone metadata the NSA collected led to just one success: the conviction of a taxi driver who sent $8,500 to a Somali group that posed no direct threat to the US — and that was probably trumped up so the NSA would have better talking points in front of Congress. The second problem with using datamining techniques to try to uncover terrorist plots is that each attack is unique. Who would have guessed that two pressure-cooker bombs would be delivered to the Boston Marathon finish line in backpacks by a Boston college kid and his older brother? Each rare individual who carries out a terrorist attack will have a disproportionate impact on the criteria used to decide who’s a likely terrorist, leading to ineffective detection strategies. The third problem is that the people the NSA is trying to find are wily, and they’re trying to avoid detection. In the world of personalized marketing, the typical surveillance subject isn’t trying to hide his activities. That is not true in a police or national security context. An adversarial relationship makes the problem much harder, and means that most commercial big data analysis tools just don’t work. A commercial tool can simply ignore people trying to hide and assume benign behavior on the part of everyone else. Government data-mining techniques can’t do that, because those are the very people they’re looking for. Adversaries vary in the sophistication of their ability to avoid surveillance. Most criminals and terrorists — and political dissidents, sad to say — are pretty unsavvy and make lots of mistakes. But that’s no justification for data mining; targeted surveillance could potentially identify them just as well. The question is whether mass surveillance performs sufficiently better than targeted surveillance to justify its extremely high costs. Several analyses of all the NSA’s efforts indicate that it does not. The three problems listed above cannot be fixed. Data mining is simply the wrong tool for this job, which means that all the mass surveillance required to feed it cannot be justified. When he was NSA director, General Keith Alexander argued that ubiquitous surveillance would have enabled the NSA to prevent 9/11. That seems unlikely. He wasn’t able to prevent the Boston Marathon bombings in 2013, even though one of the bombers was on the terrorist watch list and both had sloppy social media trails — and this was after a dozen post-9/11 years of honing techniques. The NSA collected data on the Tsarnaevs before the bombing, but hadn’t realized that it was more important than the data they collected on millions of other people. Mass surveillance plays a negligible role in initiating successful terrorist investigations Bergen et al 14 (Peter, David Sterman, Emily Schneider, and Baily Cahall. Peter Bergen is the director of the National Security Program at the New America Foundation, where David Sterman and Emily Schneider are research assistants and Bailey Cahall is a research associate. 1-2014. “Do NSA’s Bulk Surveillance Programs Stop Terrorists?” New America Foundation – National Security Program. https://www.newamerica.org/downloads/IS_NSA_surveillance.pdf. Accessed 7-9-2015. KC) Traditional investigative methods initiated 60 percent of the cases we identified. In 5 percent of the cases, a violent incident occurred prior to prevention, and in 28 percent of the cases – involving 62 individuals – court records and public reporting do not identify which methods initiated the investigation. The unclear cases may have been initiated by an undercover informant, a family member tip, other traditional law enforcement methods, CIA- or FBI generated intelligence, NSA surveillance of some kind, or any number of other methods. Additionally, some of these cases may be too recent to have developed a public record large enough to identify which investigative tools were used. In 23 of these 62 unclear cases (37 percent), an informant was involved, though we were unable to determine whether the informant initiated the investigation. The widespread use of informants suggests that if there was an NSA role in these cases, it was limited and insufficient to generate evidence of criminal wrongdoing without the use of traditional investigative tools. NSA surveillance of any kind, whether bulk or targeted of U.S. persons or foreigners, played an initiating role in only 7.5 percent of cases. To break that down further: The controversial bulk collection of telephone metadata appears to have played an identifiable role in, at most, 1.8 percent of the terrorism cases we examined. In a further 4.4 percent of the cases, NSA surveillance under Section 702 of targets reasonably believed to be outside of the country that were communicating with U.S. citizens or residents likely played a role, while NSA surveillance under an unknown authority likely played a role in 1.3 percent of the cases we examined. Metadata collection doesn’t stop terrorism Bergen et al 14 (Peter, David Sterman, Emily Schneider, and Baily Cahall. Peter Bergen is the director of the National Security Program at the New America Foundation, where David Sterman and Emily Schneider are research assistants and Bailey Cahall is a research associate. 1-2014. “Do NSA’s Bulk Surveillance Programs Stop Terrorists?” New America Foundation – National Security Program. https://www.newamerica.org/downloads/IS_NSA_surveillance.pdf. Accessed 7-9-2015. KC) However, our review of the government’s claims about the role that NSA “bulk” surveillance of phone and email communications records has had in keeping the United States safe from terrorism shows that these claims are overblown and even misleading.* An in-depth analysis of 225 individuals recruited by al-Qaeda or a like-minded group or inspired by al-Qaeda’s ideology, and charged in the United States with an act of terrorism since 9/11, demonstrates that traditional investigative methods, such as the use of informants, tips from local communities, and targeted intelligence operations, provided the initial impetus for investigations in the majority of cases, while the contribution of NSA’s bulk surveillance programs to these cases was minimal. Indeed, the controversial bulk collection of American telephone metadata, which includes the telephone numbers that originate and receive calls, as well as the time and date of those calls but not their content, under Section 215 of the USA PATRIOT Act, appears to have played an identifiable role in, at most, 1.8 percent of these cases. NSA programs involving the surveillance of non-U.S. persons outside of the United States under Section 702 of the FISA Amendments Act played a role in 4.4 percent of the terrorism cases we examined, and NSA surveillance under an unidentified authority played a role in 1.3 percent of the cases we examined. Regular FISA warrants not issued in connection with Section 215 or Section 702, which are the traditional means for investigating foreign persons, were used in at least 48 (21 percent) of the cases we looked at, although it’s unclear whether these warrants played an initiating role or were used at a later point in the investigation. (Click on the link to go to a database of all 225 individuals, complete with additional details about them and the government’s investigations of these cases: http://natsec.newamerica.net/nsa/analysis). Surveillance of American phone metadata has had no discernible impact on preventing acts of terrorism and only the most marginal of impacts on preventing terrorist related activity, such as fundraising for a terrorist group. Furthermore, our examination of the role of the database of U.S. citizens’ telephone metadata in the single plot the government uses to justify the importance of the program – that of Basaaly Moalin, a San Diego cabdriver who in 2007 and 2008 provided $8,500 to al-Shabaab, al-Qaeda’s affiliate in Somalia – calls into question the necessity of the Section 215 bulk collection program.5 According to the government, the database of American phone metadata allows intelligence authorities to quickly circumvent the traditional burden of proof associated with criminal warrants, thus allowing them to “connect the dots” faster and prevent future 9/11-scale attacks. Yet in the Moalin case, after using the NSA’s phone database to link a number in Somalia to Moalin, the FBI waited two months to begin an investigation and wiretap his phone. Although it’s unclear why there was a delay between the NSA tip and the FBI wiretapping, court documents show there was a two-month period in which the FBI was not monitoring Moalin’s calls, despite official statements that the bureau had Moalin’s phone number and had identified him.6,7 This undercuts the government’s theory that the database of Americans’ telephone metadata is necessary to expedite the investigative process, since it clearly didn’t expedite the process in the single case the government uses to extol its virtues. Additionally, a careful review of three of the key terrorism cases the government has cited to defend NSA bulk surveillance programs reveals that government officials have exaggerated the role of the NSA in the cases against David Coleman Headley and Najibullah Zazi, and the significance of the threat posed by a notional plot to bomb the New York Stock Exchange. No War Contention No War No war – democracy, trade, and IGOs check conflict escalation Shermer 14 (Michael. Michael Shermer is a journalist and writer, editor for The Skeptic, and contributor to Scientific American. 10-14-2014. “Perpetual Peace”. Scientific American. http://www.scientificamerican.com/article/perpetual-peace/. Accessed 7-8-2015. KC) In their 2001 book Triangulating Peace, political scientists Bruce Russett and John Oneal employed a multiple logistic regression model on data from the Correlates of War Project that recorded 2,300 militarized interstate disputes between 1816 and 2001. They assigned each country a democracy score between 1 and 10, based on the Polity Project, which measures how competitive its political process is, as well as the fairness of its elections, checks and balances of power, transparency, and so on. The researchers found that when two countries scored high on the Polity scale, disputes between them decreased by 50 percent, but when one country was either a low-scoring democracy or an autocracy, it doubled the chance of a quarrel between them. Kant also suggested that international trade (economic interdependency) and membership in international communities (transparency and accountability) reduce the likelihood of conflict. So in their model Russett and Oneal included data on the amount of trade between nations and found that countries that depended more on trade in a given year were less likely to have a militarized dispute in the subsequent year. They also counted the number of intergovernmental organizations (IGOs) that every pair of nations jointly belonged to and ran a regression analysis with democracy and trade scores. Overall, democracy, trade and membership in IGOs (the “triangle” of their title) all favor peace, and if a pair of countries are in the top 10th of the scale on all three variables, they are 81 percent less likely than an average pair of countries to have a militarized dispute in a given year. How has the democratic peace theory held up since 2001? With all the conflict around the world, it seems like peace is on the rocks. But anecdotes are not data. In a 2014 special issue of the Journal of Peace Research, Uppsala University political scientist Håvard Hegre reassessed all the evidence on “Democracy and Armed Conflict.” He stated that “the empirical finding that pairs of democratic states have a lower risk of interstate conflict than other pairs holds up, as does the conclusion that consolidated democracies have less conflict than semi-democracies.” Hegre is skeptical that economic interdependence alone can keep countries from going to war— the “Golden Arches Theory of Conflict Prevention” popularized by Thomas Friedman's observation that no two countries with McDonald's fight—unless their economies are in democratic nations. He wonders, reasonably, if there might be some other underlying factor that explains both democracy and peace but does not suggest what that might be. I propose human nature itself and our propensity to prefer the elements of democracy. Peace is a pleasant by-product. World Wars doesn’t disprove no war – none of the conditions that make modern peace possible existed Weede 4 (Erich. Erich Weede is a professor of sociology at the University of Bonn in Germany, as well as an author and journalist. Fall 2004. “The Diffusion of Prosperity and Peace by Globalization”. The Independent Review (The Independent Review, v. IX, n. 2, Fall 2004, ISSN 1086-1653, Copyright © 2004, pp. 165–186). http://www.independent.org/pdf/tir/tir_09_2_1_weede.pdf. Accessed 7-82015. KC) Before discussing illustrations of the capitalist peace, I should consider a standard historical objection against it. Certainly, economic interdependence, including trade, between the Western powers and the central European powers before World War I was quite strong. Nevertheless, World War I occurred. What does this evidence imply about the capitalist peace in general and about “peace by trade” in particular? First, it reminds us that all macropolitical propositions—and certainly those discussed here— are probabilistic instead of deterministic statements. We should always expect exceptions. Second, “peace by trade” is not the only component of capitalist-peace theory applicable here. Another is “peace among democracies.” The democratic character of Germany and its allies before World War I is debatable. By contemporary standards, even the democratic character of the United Kingdom before World War I is not beyond suspicion because of franchise limitations. So World War I is not a clear exception to the democratic component of the capitalist peace. Third, no one should believe that trade and democracy, or the capitalist peace, suffice to explain the presence or absence of military disputes and war. At most, we can claim that “capitalist-peace theory” summarizes some known pacifying effects, but it does not summarize conflictpromoting variables and their effects (Russett 2003). As quantitative researchers documenting the pacifying effects of democracy and trade have found again and again (for example, Oneal and Russett 1997, 1999; Russett and Oneal 2001), power balances matter, too. Before World War I, the balance of power between the opposing coalitions was fairly even. There were no pacifying preponderance effects. Although one cannot claim World War I to be a case demonstrating the value of capitalist-peace theory, neither does it undermine the theory seriously. It may be argued that the different long-term effects of the settlements of World Wars I and II derive from failure or success in applying a capitalist-peace strategy to the losers of the war. After World War I, France, which determined the peace settlement more than any other nation, failed to promote a capitalist peace. Immiseration and desperation in Germany contributed to Hitler’s ascent to power and indirectly to World War II, in which France had to be saved by its allies. After World War II, the United States pursued a capitalist-peace strategy toward the vanquished and succeeded in making allies out of Germany and Japan. International trade prevents war Weede 4 (Erich. Erich Weede is a professor of sociology at the University of Bonn in Germany, as well as an author and journalist. Fall 2004. “The Diffusion of Prosperity and Peace by Globalization”. The Independent Review (The Independent Review, v. IX, n. 2, Fall 2004, ISSN 1086-1653, Copyright © 2004, pp. 165–186). http://www.independent.org/pdf/tir/tir_09_2_1_weede.pdf. Accessed 7-82015. KC) Fourth, bilateral trade reduces the risk of war between dyads of nations (Oneal and Russett 1997, 1999; Russett and Oneal 2001). As to why trade contributes to the prevention of war, two ideas come to mind. First, war is likely to disrupt trade. The higher the level of trade in a pair (dyad) of nations is, the greater the costs of trade disruption are likely to be. Second, commerce might contribute to the establishment or maintenance of moral capital (Ratnapala 2003), which has a civilizing and pacifying effect on citizens and statesmen. In the context of this article, however, answering the question of why trade affects conflict-proneness or providing the answer with some microfoundation is less important than establishing the effect itself in empirical research. Although some writers have questioned or even rejected the “peace by trade” proposition, their criticisms are not convincing. Beck, Katz, and Tucker (1998) raised the serious technical issue of time dependence in the time-series cross-section data, but Russett and Oneal (2001; see also Oneal 2003 and Oneal and Russett 2003b) responded to the objections raised against their earlier work and demonstrated that those objections do not affect their substantive conclusions. For a while, Hegre’s (2000) study seemed to necessitate a qualification of the “peace by trade” proposition. He found that the pacifying effect of trade is stronger among developed countries than among less-developed countries. More recently, however, Mousseau, Hegre, and Oneal corrected this earlier finding and reported: “Whereas economically important trade has important pacifying benefits for all dyads, the conflictreducing effect of democracy is conditional on states’ economic development” (2003, 300). Gelpi and Grieco (2003) suggested another qualification. In their view, trade no longer pacifies relations between autocratic states. According to Mansfield and Pevehouse (2003), another modification of the “peace by trade” proposition might be required. The institutional setting, such as preferential trade agreements, matters. It is even conceivable that other forms of economic interdependence, such as crossborder investments, exercise some pacifying impact. Foreign direct investment (FDI) certainly promotes prosperity, growth, and democracy (de Soysa and Oneal 1999; de Soysa 2003), but the conceivable pacifying impact of FDI still lacks sufficient empirical investigation. The most radical criticism comes from Barbieri (2002), according to whom bilateral trade increases the risk of conflict. As outlined by Oneal and Russett (2003a, 2003b; Oneal 2003; Russett 2003), her conclusion results from disregarding the military power of nations—that is, their different capabilities to wage war across considerable distances. Should we really proceed on the presumption that war between Argentina and Iraq is as conceivable as between the United States and Iraq or between Iran and Iraq? Of course, trade has no pacifying effect on international relations wherever the risk of conflict is extremely close to zero to begin with. Even this inadequate. Russett and Oneal (2001) refer instead to a Kantian peace, which is composed of three components: the democratic peace, peace by trade, and peace by collaboration in international governmental organizations (IGOs). In their research, the IGO element of the Kantian tripod is the weakest and least robust one. I do not know who invented the term capitalist peace. I have heard it spoken more frequently than I have seen it in print, but in any event it is a felicitous term. handling of the power and distance issue by itself does not suffice to support her conclusions. If the military-conflict variable is restricted to those conflicts that resulted in at least one fatality, then trade is pacifying, whether power and distance are adequately controlled or not. Moreover, Barbieri (2003) herself found some pacifying effect of economic freedom and openness to trade on the war involvement of nations. In spite of the attempted criticism of Russett and Oneal’s findings, the “peace by trade” proposition stands and enjoys powerful empirical support. Another issue also must be considered. Barbieri’s (2002) measures are based on dyadic trade shares relative to national trade, whereas Russett and Oneal’s measures are based on dyadic trade shares relative to the size of national economies. Gartzke and Li (2003) have demonstrated—arithmetically as well as empirically— that trade shares relative to national trade may rise when nations are disconnected from world trade. Nations may concentrate most of their trade on a few partners and remain rather closed economies. If Barbieri’s and Oneal and Russett’s measures of bilateral trade and their effects are simultaneously considered, then Barbieri’s trade shares exert a conflictenhancing effect and Oneal and Russett’s trade dependence exerts a conflict-reducing effect. This finding of Gartzke and Li’s study not only replicates the substantive findings of both main contenders in the debate about trade and conflict, but it remains robust whether one relies on the Oneal and Russett data or on the Barbieri data, whether one includes all dyads or only dyads for which there is some risk of military conflict to begin with. If one is interested in finding out whether more trade is better or worse for the avoidance of military conflict, then it seems more meaningful to focus on a measure that is related to openness at the national level of analysis, as Oneal and Russett (1997, 1999, 2003a, 2003b; Russett and Oneal 2001) have done, than on a measure that may be high for fairly closed economies, as Barbieri (2002) has done. Actually, the pacifying effect of trade might be even stronger than the pacifying effect of democracy (Oneal and Russett 1999, 29, and 2003a, 160; Gartzke 2000, 209), especially among contiguous pairs of nations, where conflict-proneness is greater than elsewhere. Moreover, trade seems to play a pivotal role in the prevention of war because it exerts direct and indirect pacifying effects. In addition to the direct effect, there is the indirect effect of free trade as the consequent growth, prosperity, and democracy reduce the risk of militarized disputes and war. Because the exploitation of gains from trade is the essence or purpose of capitalism and free markets, I label the sum of the direct and indirect international security benefits “the capitalist peace,” of which “the democratic peace” is merely a component.1 Even if the direct “peace by trade” effect were discredited by future research, economic freedom and globalization would still retain their crucial role in overcoming mass poverty and in establishing the prerequisites of the democratic peace. For that reason, I (Weede 1996, chap. 8) advocated a capitalist-peace strategy even before Oneal and Russett (1997, 1999) convinced me of the existence of a directly pacifying effect of trade. An Asian statesman understood the capitalist peace intuitively even before it was scientifically documented and established. According to Lee Kuan Yew, “The most enduring lesson of history is that ambitious growing countries can expand either by grabbing territory, people or resources, or by trading with other countries. The alternative to free trade is not just poverty, it is war” (qtd. in “Survey: Asia” 1993, 24). Great power war is impossible if US responsibly manages foreign relations Ward 14 (Alex. Alex Ward is a specialist on US defense policy and strategy at the Atlantic Council’s Brent Scowcroft Center on International Security. 8-22-2014. “Only US Can Prevent Great Power War.” The Diplomat. http://thediplomat.com/2014/08/only-us-can-prevent-great-power-war/. Accessed 7-8-2015. KC) Although the world currently satisfies Gilpin’s three preconditions, there need not be pessimism. For one, current relations between the United States and China are nowhere near the point where a potential great war between them is possible, and there is no other rivalry nearing that of Washington and Beijing. Second, some of the trends that can cause harm, like rapid technological progress, can also be used to help stabilize the global order. To be sure, technology could be used to curb the desolation brought on by expectedly low water, food, and energy levels. Finally, and most importantly, Gilpin’s guidance is certainly not comprehensive. There are more variables for which to account (i.e. the effect of nuclear weapons) that dictate whether or not a great power war may take place. That said, Gilpin’s framework serves as a good rubric by which to measure the current global climate. By all measures, this is certainly a dangerous time. But Gilpin’s preconditions shouldn’t be misconstrued as predictive or fatalistic. Indeed, the United States, as the hegemon, has the capability (and responsibility) to preserve the international order and lead the world out of this mess. By keeping good relations with partners and allies, deterring adversaries, reversing the perception of its decline, and leveraging technological capabilities for global good, there is a decent chance that the U.S. can make the great-power-war-incubation period fade away. Should the United States not seize this moment, and ensure that China is a responsible partner in the current global system alongside it, then the chance of a great power war cannot be dismissed, however remote. Surveillance Education Key Explicit Education about surveillance key – its prevents oppressive government policies and other strategies fail Doctorow ’13 (June 14th 2013, Cory Doctorow is an activist, and co-editor of the blog Boing Boing - blog focused on politics, The Guardian, “The NSA's Prism: why we should care” http://www.theguardian.com/technology/blog/2013/jun/14/nsa-prism DA:7/8/15 CB) **Edited for Gendered Language The revelations about Prism and other forms of NSA dragnet surveillance has got some people wondering what all the fuss is. When William Hague tells us that the innocent have nothing to fear from involuntary disclosure, it raises questions about exactly what harms might come about from being spied upon. Here are some reasons you should care about privacy, disclosure and surveillance. We're bad at privacy because the consequences of privacy disclosures are separated by a lot of time and space from the disclosures themselves. It's like trying to get good at cricket by swinging the bat, closing your eyes before you see where the ball is headed, and then being told, months later, somewhere else, where the ball went. So of course we're bad at privacy: almost all our privacy disclosures do no harm, and some of them cause grotesque harm, but when this happens, it happens so far away from the disclosure that we can't learn from it. You should care about privacy because privacy isn't secrecy. I know what you do in the toilet, but that doesn't mean you don't want to close the door when you go in the stall. You should care about privacy because if the data says you've done something wrong, then the person reading the data will interpret everything else you do through that light. Naked Citizens, a short, free documentary, documents several horrifying cases of police being told by computers that someone might be up to something suspicious, and thereafter interpreting everything they learn about that suspect as evidence of wrongdoing. For example, when a computer programmer named David Mery entered a tube station wearing a jacket in warm weather, an algorithm monitoring the CCTV brought him to the attention of a human operator as someone suspicious. When Mery let a train go by without boarding, the operator decided it was alarming behaviour. The police arrested him, searched him, asked him to explain every scrap of paper in his flat. A doodle consisting of random scribbles was characterised as a map of the tube station. Though he was never convicted of a crime, Mery is still on file as a potential terrorist eight years later, and can't get a visa to travel abroad. Once a computer ascribes suspiciousness to someone, everything else in that person's life becomes sinister and inexplicable. You should care about dragnet surveillance because it gives cops bigger haystacks with proportionately fewer needles. The 9/11 Commission said that America's spooks had everything they needed to predict the attacks – but it was lost amid all the noise of overcollected data. Since then, the overcollection has gone into overdrive – the haystacks are enormous, but they still have the same number of needles in them. I want my skies safe, just like you – so I want my spooks doing their job well, not simply sucking up all the data in the hopes it it will be useful some day. You should care about surveillance because you know people who can be compromised through disclosure: people who are gay and in the closet; people with terminal illnesses; people who are related to someone infamous for some awful crime. Those people are your friends, your neighbours, maybe your kids: they deserve a life that's as free from hassle as you are with your lucky, skeleton-free closet. You should care about surveillance because once the system for surveillance is built into the networks and the phones, bad guys [People] (or dirty cops) can use it to attack you. In Greece, someone used the police back door on the national phone company's switches to listen in on the prime minister during the 2005 Olympic bid. Chinese hackers used Google's lawful interception back door to hack Gmail and figure out who dissidents talked to. Our communications systems are more secure if they're designed to keep everyone out – and adding a single back door to them blows their security models up. You can't be a little bit pregnant, and the computers in your pocket and on your desk and in your walls can't be a little bit insecure. Once they're designed for surveillance, anyone who can bribe or impersonate a cop can access them. As for Hague: if the innocent have nothing to fear from disclosure, then why did his own government demand an unprecedented system of secret courts in which evidence of UK intelligence complicity in illegal kidnapping and torture can be heard? Privacy, it appears, is totally essential for the powerful and completely worthless for the rest of us. Surveillance education key – its critical to prevent global totalitarianism – three strategies Schneier ’13 (Bruce Schenier Bruce Schneier is an American cryptographer, computer security and privacy specialist, and writer. He is the author of several books on general security topics, computer security and cryptography, The Guardian, “The US Government Has Betrayed the Internet. We Need to Take It Back.”, http://xa.yimg.com/kq/groups/20568679/1893962603/name/2013+09+07-SchneierThe+US+Government+Has+Betrayed+the+Internet.+We+Need+to+Take+It+Back.pdf DA:7/8/15 CB) Government and industry have betrayed the internet, and us. By subverting the internet at every level to make it a vast, multi-layered and robust surveillance platform, the NSA has undermined a fundamental social contract. The companies that build and manage our internet infrastructure, the companies that create and sell us our hardware and software, or the companies that host our data: we can no longer trust them to be ethical internet stewards. This is not the internet the world needs, or the internet its creators envisioned. We need to take it back. And by we, I mean the engineering community. Yes, this is primarily a political problem, a policy matter that requires political intervention. But this is also an engineering problem, and there are several things engineers can - and should - do. 9/7/13 The US Government Has Betrayed the Internet. We Need to Take It Back. 2/3 One, we should expose. If you do not have a security clearance, and if you have not received a National Security Letter, you are not bound by a federal confidentially requirements or a gag order. If you have been contacted by the NSA to subvert a product or protocol, you need to come forward with your story. Your employer obligations don't cover illegal or unethical activity. If you work with classified data and are truly brave, expose what you know. We need whistleblowers. We need to know how exactly how the NSA and other agencies are subverting routers, switches, the internet backbone, encryption technologies and cloud systems. I already have five stories from people like you, and I've just started collecting. I want 50. There's safety in numbers, and this form of civil disobedience is the moral thing to do. Two, we can design. We need to figure out how to re-engineer the internet to prevent this kind of wholesale spying. We need new techniques to prevent communications intermediaries from leaking private information. We can make surveillance expensive again. In particular, we need open protocols, open implementations, open systems - these will be harder for the NSA to subvert. The Internet Engineering Task Force, the group that defines the standards that make the internet run, has a meeting planned for early November in Vancouver. This group needs to dedicate its next meeting to this task. This is an emergency, and demands an emergency response. Three, we can influence governance. I have resisted saying this up to now, and I am saddened to say it, but the US has proved to be an unethical steward of the internet. The UK is no better. The NSA's actions are legitimizing the internet abuses by China, Russia, Iran and others. We need to figure out new means of internet governance, ones that makes it harder for powerful tech countries to monitor everything. For example, we need to demand transparency, oversight, and accountability from our governments and corporations. Unfortunately, this is going play directly into the hands of totalitarian governments that want to control their country's internet for even more extreme forms of surveillance. We need to figure out how to prevent that, too. We need to avoid the mistakes of the International Telecommunications Union, which has become a forum to legitimize bad government behavior, and create truly international governance that can't be dominated or abused by any one country. Generations from now, when people look back on these early decades of the internet, I hope they will not be disappointed in us. We can ensure that they don't only if each of us makes this a priority, and engages in the debate. We have a moral duty to do this, and we have no time to lose. Dismantling the surveillance state won't be easy. Has any country that engaged in mass surveillance of its own citizens voluntarily given up that capability? Has any mass surveillance country avoided becoming totalitarian? Whatever happens, we're going to be breaking new ground. Again, the politics of this is a bigger task than the engineering, but the engineering is critical. We need to demand that real technologists be involved in any key government decision making on these issues. We've had enough of lawyers and politicians not fully understanding technology; we need technologists at the table when we build tech policy. To the engineers, I say this: we built the internet, and some of us have helped to subvert it. Now, those of us who love liberty have to fix it. Surveillance education key – Its critical to prevent oppression and successfully solve all security risks – Regulation absent education fails Mameli ’08 (Peter A. Mameli, Ph.D. John Jay College of Criminal Justice, Critical Issues in Justice and Politics, Volume 1, Number 1, pages 31-41, “TRACKING THE BEAST: TECHNO-ETHICS BOARDS AND GOVERNMENT SURVEILLANCE PROGRAMS” https://www.suu.edu/hss/polscj/journal/V1N1.pdf#page=41 DA: 7/8/15 CB) Democratic nation-states are experiencing a surge in surveillance programs as a result of terrorist attacks in the United States, Spain and the United Kingdom over the last six years. With the growth of surveillance operations comes a need to ensure that not only the security of the state is protected, but also the civil liberties of the populace. This paper examines methods of accountability, transparency and oversight that can be applied to monitor and control such efforts through heightened cooperation between government surveillance entities and established oversight practitioners. In particular, the primary recommendation made here is for law enforcement organizations across levels of response to consider developing and implementing Techno-Ethics Boards in order to ensure that the ongoing practice of surveillance in a free society can be scrutinized and held to an acceptable standard for a democratic country. Introduction In Thomas Hobbes’ 1651 treatise, “Leviathan,” he examined the condition of man, government and the human spirit. Hobbes’ work and thought lives on today among realist, neo-realist and conservative political thinkers. His ideas are continuously referred to in international relations theories and discourse as a jumping off point for scholars and practitioners alike. Hobbes saw the legitimate power of government as vested in the sovereign, once the commonwealth had agreed to such power transference. The sovereign could then apply their will and power to mitigate a natural world of anarchic behavior among human beings that pitted each against all. This natural world left people in a quandary, facing a myriad of problems within a state of constant war that would impact on survival. Noting among the chief threats: TRACKING THE BEAST: TECHNO-ETHICS BOARDS & GOVERNMENT SURVEILLANCE PROGRAMS 32 “and which is worst of all, continual fear, and danger of violent death; and the life of man, solitary, poor, nasty, brutish, and short.” (Hobbes, 1968, p.186). As the post September 11, 2001 world of New York City and Washington D.C., the post March 11, 2004 world of Madrid, Spain, and the post July 7, 2005 world of London, England show us, democratic nation-states and their people are once again facing fear of violent death in a seemingly anarchic world without rules – and searching for answers to this plight. The current response has been to strengthen an emerging surveillance society in many respects, encouraging wider electronic surveillance techniques, increasing data mining and manipulation, and enhancing profiling and recognition initiatives (see American Civil Liberties Union, 2004, for an example of the experience in the United States). This is Leviathan’s legacy – the beast with a million eyes and ears, threatening a true Hayekian nightmare (Hayek, 1976). But does it need to be so? Enhanced surveillance is considered as warranted by many under the current circumstances, but such practices come with a responsibility (Lyon, 2003). The responsibility to weigh and balance the individual rights of the populace against the security needs of the state. Accomplishing such a goal is complex and multi-faceted. One element of the puzzle to put into place involves establishing accountability and oversight mechanisms that can help create transparency of government run surveillance operations to the public. To date, both discussion of this matter and its implementation have been found wanting. Looking at electronic surveillance one finds a multitude of techniques that are now at the disposal of those in power to monitor and examine both individual and population wide practices (Marx, 2002: pp. 12-13). From closed circuit television (CCTV) to video and computer monitoring, to polygraphs, to data aggregation and manipulation, wiretapping and enhanced eavesdropping methods, a web of surveillance is being woven around people within society (see Muller and Boos, 2004: p. 162, for one such example in Zurich, Switzerland). The impacts are varied, as are the success rates. Regarding advances with technology such as CCTV alone, we find a variety of strengths and weaknesses resulting from application. Clearly, after the London train and bus bombing in 2005, it was obvious that CCTV was invaluable in tracking down terrorists after the attack. The roving monitoring system provided police with quick and effective PETER A. MAMELI 33 tracking evidence that allowed for a swift and capable operational response. This incident should make plain that CCTV has something to offer society, yet all the news about CCTV may not be good. Does CCTV have any preventative capabilities for stopping terrorist attacks before they take place? Or are we simply inundating our surroundings with cameras for the sake of after the fact evidence gathering? If so, at what price to our everyday freedoms are we allowing our fears to push us? Further still, Goold notes that the effect of CCTV on police behavior can be both positive and negative, and that there needs to be a means of ensuring that the police do not interfere with the processes of complex surveillance regimes to protect themselves from charges of misconduct (Goold, 2003: pp. 200201). Muller and Boos also point out that there are a variety of dimensions to consider when reviewing CCTV systems simply for their effectiveness, and that the dimensions and sophistication of CCTV systems can impact on its overall value (2004: pp. 165-171). Given the above questions, many consider it necessary to begin developing means of accountability and oversight that can ensure correct usage of this technology in a way that the public can feel both safe and secure with. And this is only a brief discussion of one type of surveillance system. There are many, with equally weighty concerns to ponder. Ultimately, the question first becomes one of ends. Although there are no doubt those who would disagree, it is assumed here that the purpose of said surveillance is at least intended to be benign, and aimed at protection of both the individual and state despite the negative externalities that may arise. But what are the goals we are seeking to achieve when contemplating managing the growing surveillance world? Is it to control what we are creating so that we strike a balance between security and liberty? Or, are we seeking to give these tools and their users flexibility outside of our oversight capabilities in order to calm our nerves and assuage our fears? Despite the compelling needs associated with protection and security, the only answer that a democratic society can provide is the former. With this position clarified we can then move on to the questions of means. Oversight of Surveillance Programs Central to the discussion of accountability of government surveillance programs is the question of what methods of oversight are at our disposal to ensure surveillance technologies, techniques and results are reasonably controlled and monitored? And more importantly, how can these methods of oversight be implemented productively? For instance: TRACKING THE BEAST: TECHNO-ETHICS BOARDS & GOVERNMENT SURVEILLANCE PROGRAMS 34 ‚ How can auditing of surveillance activities best serve to create public transparency without sacrificing operational secrecy? ‚ How can program evaluations be developed to provide information to elected officials, administrators and citizens as to the success or failure of surveillance efforts without compromising their effectiveness? ‚ Do contracts with independent vendors need to require that their work on building new surveillance systems undergo scrutiny by independent ethics boards familiar with the complexities of the technology? ‚ Should RFPs stipulate that such new efforts take place within frameworks of ethics requirements determined beforehand by numerous entities with expertise in the field in question? ‚ Should deployment and implementation of surveillance tools undergo ongoing scrutiny by entities comprised of internal and external monitors to ensure compliance with acceptable standards and norms of application in a democratic society? Answering these questions, and more, holds the future of this field in the balance. Some of these methods can be used up front (RFPs, contracting requirements and formative program evaluations) and others can appear throughout the life of surveillance operations (performance and financial audits, interim and summative program evaluations, and performance measurement reporting). The problems arise with the willingness and ability to structure these activities into the logic of ongoing surveillance operations across levels of government. Are such oversight activities mandated and expected to happen in regular patterns with regular reporting to elected officials and the public, or simply desired and left to occur at the will of the agencies and oversight bodies involved? It appears that the latter is the case more often than not – and this needs to change. The question is how? To date, hard law and regulation have served as a less than ideal means of managing surveillance activities across levels of government where oversight responsibilities are concerned. While such legal tools hold a necessary place among the approaches to monitoring and controlling such operations after long and detailed public discussion is engaged in (such as developing actual law, and codified rules of practice for established techniques such as wiretapping), it has at times proven PETER A. MAMELI 35 ineffective in certain areas of practice and has required that effective oversight is needed to rectify emerging problems. For one recent example we need look no further than problems the Federal Bureau of Investigation (FBI) has encountered with their surveillance practices. While the USA PATRIOT Act has authorized the use of National Security Letters, essentially administrative subpoenas, by the FBI in investigations of international terrorism and foreign spying (Doyle, 2006), a Department of Justice, Office of Inspector General (OIG) report identified that there was insufficient monitoring of the implementation of this tool by its field offices in the earlier part of this decade. These findings raised questions of impropriety and illegality in the resulting FBI surveillance activities (Associated Press, 2007). It is important that this step was taken by the OIG before waiting for problems to find their way into the court system for settlement through judicial review of administrative operations. And it is just this type of occurrence that points out the weaknesses and openings for abuse that can develop between the development of hard law and regulation and its resulting implementation. In other situations, developers of hard law and regulation can find themselves struggling to offer the insight required to do the job of managing surveillance activities effectively where newer forms of technology are involved. For example, unique expertise that exists among private sector professionals developing technology and innovations within certain fields, such as facial recognition imaging, enables them to operate at such high levels that without commensurate knowledge at their disposal government regulators and elected officials may find themselves challenged to create control mechanisms that are on point. Understanding these shortcomings, a more flexible means of ongoing oversight needs to be sought out that can provide stability as implementation of hard law and regulation requirements are pursued. One approach to managing our growing surveillance society is to heighten flexible governmental regulation and oversight activities through the exploration of what has been termed “soft law” and/or “soft regulation.” Discussions of soft law and soft regulation can be considered as a part of an emerging discussion on the overall value of regulation and governance that has recently come to the foreground (Braithwaite, Coglianese, and Levi-Faur, 2007). Soft law and soft regulation are inexact terms that cover a multitude of quasi-legislative, often non-binding instruments used to enhance government efforts to regulate service delivery areas. These instruments hopefully enable policy changes to emerge and harden TRACKING THE BEAST: TECHNO-ETHICS BOARDS & GOVERNMENT SURVEILLANCE PROGRAMS 36 through voluntary application and adherence in both confrontational and politicized atmospheres where a wide array of players from the public, private and non-governmental sectors are involved (see Brandsen, Boogers and Tops, 2006: p. 550-551; and Mameli, 2000, p. 203-204). Such tools have been referred to broadly as “unofficial guidelines” that deliver information to those being regulated (Brandsen, Boogers and Tops, 2006: p. 546). Some of the instruments that communicate these ideas include codes of governance, quality standards, letters of advice, handbooks, manuals, reports, declarations, recommendations, guidelines and resolutions, to name a few (see Brandsen, Boogers and Tops, 2006: p. 546; and Mameli, 2000, p. 203). The result is hopefully a collaborative effort at ensuring quality service delivery by all parties involved in the process. Sometimes they can even result in the drafting of binding legal agreements after a slow process where policy diffusion is accepted and validated by the players affected. In the case of government surveillance programs construction and delivery of mutually acceptable guidelines for the ongoing management and oversight of these activities would likely enhance their reliability in the eyes of the public. Among the guidelines provided could be agreement to the need for time driven audits and program evaluations, ongoing development of relevant performance measurement indicators, public reporting expectations, and the use of Techno-Ethics Boards to resolve issues of ethical concern while developing advice for carrying out surveillance activities from the beginning of operations through to their conclusion. However, while such an approach promises to relieve problems and pressures that have surfaced with surveillance programs there are quandaries to overcome as well. Quasi-legislative instrumentation of the nature discussed here is voluntarily adhered to and presents an uncertain edict to those on the receiving end. The intent is obvious. The authors believe that others should follow these “suggestions” and upgrade their operations accordingly. Yet there is no mandated action to be taken. These are not new laws or regulatory rules that must be followed, they are something else indeed. Important enough to be taken note of, but ignored at one’s own professional and personal peril (Brandsen, Boogers and Tops, 2006: p. 550-551). Complicating matters further, soft law and soft regulation often suggests that new implementation norms be followed and attested to through self-reporting by the entities that are charged with providing a particular service. Yet given that a gap exists between hard law and regulation and implementation in this sensitive policy area, I PETER A. MAMELI 37 believe such an approach to remedying some of the complications involved may very will find success if crafted carefully. This conundrum frames a central discussion point that needs to be entertained here. How does soft law and soft regulation consistently result in something more than soft, or even abdicated, governance? Even if governance was found lacking before, does this yield a better answer? How can you be sure you have not let the fox guard the henhouse when you are counting on the fox to give you a daily testament to his/her actions? Given this problem, it is important to begin by noting that there are two sides to the coin of soft law and soft regulation. The first side of the coin views the use of such unofficial guidelines as necessary tools to distribute new information to agents perceived as needing to update and improve their services while still creating room for innovative practices to flourish. This view assumes good faith on the part of those being regulated to honestly pursue addressing the suggested course of action, or to offer a better path to follow . The other side of the coin is one where the suggested changes are not implemented due to a lack of comprehension or ability on the part of the receiver, a lack of leverage on the part of the sender, or worst of all, a desire to engage in fraud, waste or abuse by keeping loopholes open and outside eyes closed by one or both (see Brandsen, Boogers and Tops, 2006: p. 547-548 for a nice break out of possible paths regulated parties can take in reaction to unofficial guidelines). Both sides of the coin are relevant aspects of the discussion about the implications these instruments pose for practitioners of soft law and soft regulation in complex environments. In unpacking these concerns it is important to first examine weaknesses that complicate the process, and then note how particular forms of collaborative (rather than adversarial) interaction between oversight entities and those being inspected can improve possibilities for progress through enlightened, triangulated oversight. Next, addressing elements of performance measurement and management that can be used in constructing transparent and accountable partnerships between oversight agents and those being inspected must be further examined. Together, these efforts represent an attempt to stretch the current discourse on regulating new and complex surveillance technologies into less well traveled areas of thought. Considering a role for oversight personnel in government surveillance operations that runs counter to the logic of reaction and punishment that often permeate such discussions, and then offering a tool to build trust between these parties and enhance capacity to achieve success, this framework can hopefully create room for free TRACKING THE BEAST: TECHNO-ETHICS BOARDS & GOVERNMENT SURVEILLANCE PROGRAMS 38 thinking and discussion about soft law and regulation in regard to the surveillance society of the future. Techno-Ethics Boards And Government Surveillance The use of soft law and soft regulation opens doors to programmatic innovation and improvement when constructed well. In practice it can serve to mitigate administrative confusion and folly when implementation of perceived surveillance norms, set out in hard law and regulation, founders due to imprecise understandings of how to accomplish desired ends. However, it is also true that political stressors and unclear messages from central authorities regarding unofficial guidelines can drag down the potential gains of the process by causing those being regulated to stifle innovation and simply toe the line in order to avoid being cited during inspections and oversight – even though these are not clear infractions that they will be called on (Brandsen, Boogers and Tops, 2006: p. 550-551). In such a scenario, the process that should lead to an active interchange of ideas between the center and the periphery that results in continuous improvement only leads to a game of follow the leader, or worse, resistance. Further still, poorly developed unofficial guidelines that do not provide effective problem resolution can also allow for abuse in application by practitioners. We should be striving to shut off the mains that allow illegal activity to flow forward by crafting useful soft law and regulation that also improves results. In the world of surveillance operations such a goal is of great value in and of itself given the threats to liberty, privacy and civil rights that hang in the balance. The question that emerges becomes: How can the relationship between those sending the soft forms of guidance and those receiving it be made to work better? Can we ensure transparency, attain accountability, improve effectiveness, prevent misconduct and enable innovation all at once? And, can individuals charged with overseeing surveillance programs help this development along in a front to back process? The answer seems to boil down to partnership and how to achieve it. If creative interchange between all parties is what is desired, then trust must be created to allow the interchange to flourish. But the trust needs to run through the entire process. Trust must exist in the formulation of the quasi-legislative instruments and advice up front, and then in the oversight process that is created afterward. However, it is hard to create that level of trust when there is resistance to oversight in PETER A. MAMELI 39 sensitive areas of national security (involving surveillance operations, or any other activity). Certainly the recent problems between the United States Central Intelligence Agency and its own Office of Inspector General, where the former challenged the investigative methods of the latter in politically sensitive reviews, attest to this dilemma (Mazzetti and Shane, 2007). Indeed, at the time of this writing the agency has successfully managed to create two new positions to oversee the actions of it’s own internal watchdog (Miller, 2008)! Yet oversight and accountability of national security activities must exist, and so the conundrum surrounding trust is laid bare. One undeniable finding from the CIA’s situation so far is that a lack of trust in oversight operations distracts an organization from accomplishing its mission, at the very least. Therefore, it seems clear that trust needs to be established early on rather than as an afterthought or result of a crisis if government is to function effectively. Trust can be developed in a number of ways at the beginning of the process when advice is crafted and distributed to surveillance practitioners in soft or hard forms. The first model that could be accessed to accomplish this is where the public sector defers to nongovernmental parties from the start in the development of said guidelines (see Brandsen, Boogers and Tops, 2006: p. 552; and, Bernstein and Cashore, 2007 for other examples). This is similar to a model of rulemaking that Weimer refers to as “private rulemaking” (Weimer, 2006: p. 569). It is important to note that the private rulemaking model is different than “negotiated rulemaking,” where external parties engage in the process but don’t control it, or “agency rulemaking,” where experts and advisory boards are only invited in to offer their insight and support (Weimer, 2006: p. 569). Yet while these approaches can create buy-in early that will help to ease relationships in the future, and should also be pursued when developing soft law, it does not fully address the negative reactions to oversight discussed above that follow down the road. Another level of trust needs to be developed in order to get over this hurdle. And, it is incumbent on the personnel charged with such oversight to help facilitate that trust. But how can this be achieved when thinking in the world of inspection is colored by expectations of adversarial relationships, rather than collaborative ones? One way is to explore the creation of a means that will ensure constructive engagement between the parties who could be involved with such a process from front to back. To achieve this purpose I am suggesting developing Techno-Ethics Boards. Akin to Institutional TRACKING THE BEAST: TECHNOETHICS BOARDS & GOVERNMENT SURVEILLANCE PROGRAMS 40 Review Boards (IRBs) in universities, and Bioethics Boards in health settings, Techno-Ethics Boards in law enforcement settings would be charged with advising surveillance practitioners on how to go about implementing hard law and regulation on these matters. They would also be responsible for addressing ongoing questions of acceptable practice that would evolve as technology (and crime) changes. However, different from IRBs, they would not have the ability to prevent the implementation of surveillance programs. Due to the need for security, and the sensitive nature of information that may need to remain protected even from the Board itself, final calls on implementation would still remain with law enforcement personnel directly involved with the activity. Hence, the Board’s oversight of said surveillance operations would still have limits. Yet this additional layer of scrutiny would no doubt aid in clarifying problems and halting preventable errors through the application of soft governance built on soft instrumentation. IRBs have been used within universities for decades in order to protect human and animal subjects from research abuses (Neuman, 2003: p.129). While the protections of subjects and procedures for construction of a Techno-Ethics Board to provide guidance to government surveillance programs might indeed differ from an IRB, it is no doubt a worthwhile enterprise to begin exploring. Could such a body stop abuses from happening where law enforcement is trying to protect national security, but going beyond acceptable norms of practice? If so, it is at least worth the effort to take a hard look at the possibilities for such Boards. Why risk making the error of creating a new type of Stanley Milgram scenario, where both surveillance practitioners and their subjects become victims of overzealous observation efforts, if it can be short-circuited (Singleton, Jr. and Straits, 2005: p. 519)? As with federally mandated IRBs a Techno-Ethics Board would require a spray of appropriate expertise and talent, with a membership of at least five parties (Singleton, Jr. and Straits, 2005: p. 530). My recommendations would include, at a minimum: one lawyer, one ethicist, one technology expert, one oversight expert, and one field practitioner. As with IRB appointments, sensitive demographic information would also need to be taken into account in the development of a Techno-Ethics Board in order to ensure a balance of backgrounds are represented (O’Sullivan, Rassell and Berner, 2007: p. 261). All may come from government circles, or none. However, there are complications that come with including non-governmental entities in security driven operations that makes for a quandary in this regard. It is more likely, given the PETER A. MAMELI 41 information and context that surveillance reviews would take place under, that personnel would need to be drawn from across differing law enforcement agencies (and perhaps levels of government) more so than from outside parties. Regardless of who is chosen to serve however, the goal, of course, would not be to create a confrontational atmosphere but rather a mutually supportive one where professionals concerned with surveillance and its implications could gather to address real world implementation concerns. Surveillance education is key to high school students – they’re a top target of surveillance – three different programs. Burns ’10 (David R Burns is Fulbright Senior Research Fellow, India United States Department of State Bureau of Educational and Cultural Affairs, Associate Professor (with tenure) of Digital Media Art and Animation Southern Illinois University, Conferência Internacional de Artes de Novas Mídias “Borders, surveillance, and control in the digital age” http://bshi.dburns.com/pdf/drburns_softborders.pdf DA: 7/8/15 CB) The US Department of Homeland Security administers the Student and Exchange Visitor Information System (SEVIS) in connection with the US-VISIT program. SEVIS was designed to track and monitor international students before they arrive in and during their stay in the US. SEVIS includes data on close to a million foreign students, exchange visitors, and their dependents that is collected before they enter, when they enter, and during their stay in the US. This information includes “biographical information of the student or exchange visitor and their dependents (name, place and date of birth, spouse and children's data); academic information (status, date of study commencement, degree program, field of study, institutional disciplinary action); employment information (employer name and address, employment beginning and end dates); school information (campus address, type of education or degrees offered, session dates), and exchange visitor program information” (Electronic Privacy Information Center, 2005). This information combined with the personal information collected for obtaining a visa through the US-VISIT program builds a well-defined profile of students and visitors in the US. However, this type of program is not restricted to international students. The US Department of Education has expressed its desire to monitor and track US students. In 2005, the Department of Education released a feasibility report for a national Student Unit Record System to track US students using individually identifiable information such as “name, Social Security Number, date of birth, address, race/ethnicity, gender, and field of study that are attached to an individual student’s record” (Cunningham, A., Milam, J., & Stratham C., 2005). The system would also include academic performance, receipt of financial aid from federal, state, and institutional sources and track students as they move to different institutions (Cunningham, A., Milam, J., & Stratham, C., 2005). The US Department of Education is continuing to develop plans for this student surveillance system that would be accessible to not only to the US Department of Education, but also to the US Attorney General’s office and the US Justice Department for national Borders, surveillance, and control in the digital age David R. Burns 6 security purposes (Electronic Privacy Information Center, 2005). In 2003, the US Department of Defense also began compiling a large-scale student database of personal information for recruiting purposes. The US Department of Defense has proposed that it plans to continue gathering personal information on American students including minors as young as 16 years old. According to the Electronic Privacy Information Center, the database will be “managed by a private direct marketing firm and will include such information as grade point average, ethnicity, and social security number” of each student (Electronic Privacy Information Center, 2005). The US government entering into a large scale marketing agreement and capitalizing on students’ personal information is a new development in the way the government agencies are accessing and controlling their citizens’, including minors’, personal information for non-security related projects. Bogard (2006) comments that control over “access to data on you, but not by you, is the goal of police (corporate, state) control of surveillance networks”. Government’s use of personal student information for marketing purposes is a new development in the way governments are leveraging the formerly private information they collect on citizens of all ages. These three programs, SEVIS, Student Unit Record System, and the DOD database; combined with the US-VISIT program illustrate the creation of a powerful Orwellian surveillance system to track international and US students across and within US borders. The US Department of Homeland Security has already granted the FBI access to SEVIS and US-VISIT (Field, 2004). This new area of collaboration between academic institutions and government agencies to track and monitor students is a critical area to watch for potential abuses of personal privacy. A critical issue to consider is who or what governmental and non-governmental institutions have access to all of the personal information being collected and for what purposes? The US Department of Homeland Security reports that the US-VISIT program “provides biometric identification and analysis services to federal, state and local agencies” (US Department of Homeland Security, 2008). In the past, the US Department of Homeland Security required that airlines and cruise companies report personal passengers’ information to them. If this information is combined with individuals’ credit card information, a more complete profile of each individual becomes clear. Companies like Acxiom collect individuals’ contact information, estimated incomes, home values, occupations, religions, shopping habits and keep records for TransUnion, one of the world’s largest credit reporting agencies. All of this data has been shared with the US government since 9/11 (O’ Harrow, 2005). When this data is combined with information from SEVIS and the Department of Defense databases, government and nongovernment institutions have the potential to create a more complete system that can be used to profile, index, track and monitor individuals. 5. CONCLUSION The tiers of surveillance technology used to monitor, track, and control individuals’ movements within, across and outside borders described in this paper indicate a shift from public and private institutions’ physical control and physical monitoring of individuals to their electronic control and electronic monitoring of individuals. This type of electronic, panopticonal surveillance and control ranges from government satellites, which monitor individuals’ communications, to portable electronic devices, which provide information about individuals’ physical locations, to virtual border controls, which allow institutional border control programs to automatically read individuals’ biometric data. Private and public institutions’ use of these new surveillance technologies has allowed older models of localized, physical controls over individuals within, across and outside of physical borders to be replaced with an electronic, decentralized apparatus of control that transcends physical borders. Public and private institutions’ use of this electronic, decentralized apparatus of control to track individuals’ vehicles, portable electronic devices and biometric data presents potential concerns about individuals’ personal privacy. Public and private institutions are moving toward a ubiquitous, seamless model of surveillance and control that extends beyond tracking and monitoring individuals’ physical movements across international borders to tracking and monitoring individuals’ physical and virtual movements across localized micro-borders such as streets, stores, and homes. This new model relies not only on deterritorialization and biometrics but also on individuals’ electronic identities. In the past, individuals were able to opt out of being monitored and controlled by living without mobile phones, the latest technological gizmos for their vehicles, and traveling across distant physical borders. Now individuals can no longer avoid the gaze of surveillance and prevent the collection of their personal information as they move across localized physical and virtual borders. ****Surveillance education in debate is critical to teach advocacy skills that solve totalitarianism, and the failure of surveillance policies – it is the only way for a public opinion to be formed - Sweden proves. Kullenberg ’09 (Kullenberg, Christopher, PhD, University Gothenburg, His dissertation concerns the statistical social sciences, their epistemic problems and their role in modern societies, and contains a case-study of the SOM-institute, a Gothenburg research center that has been very successful in providing large surveys, "The social impact of IT: Surveillance and resistance in present-day conflicts." How can activists and engineers work together pg. 37-40. http://fiff.de/publikationen/fiff-kommunikation/fk-2009/fiff-ko-12009/fiko_1_2009_kullenberg.pdf DA: 7/8/15 CB) Since the 9/11 attacks the world has been challenged with intrusive legislation upon civil liberties and increased use of surveillance technologies. As this development is proceeding rapidly, both from a legal point of view and the technological side, it takes more than parliamentary politics to pursue a democratic and open discussion about these matters. This is where the civil society, or rather the civil societies, need to collaborate. Thus, I will propose that engineers, software-programmers and people in the private sector of Information Technology could co-operate with activists, human-rights organizations and citizen-journalists in a very productive manner. I will also give tangible examples on how such activities have been pursued in Sweden during a controversy on the role of signals intelligence. Surveillance and war. Issues that keep arising in the backwaters of the “wars” on terrorists, drugs, and trafficking are often complex and require technical and legal expertise, not only to be understood, but more importantly, to be taken seriously in the public debate by the media. In order to avoid laws are passed without a proper debate or that technologies are implemented as merely technical solutions, I will propose that criticism could have a positive task in building a collaborative informational infrastructure, an effective media strategy, and other innovations. Let me give an example from Sweden. During 2008, a law was passed which allowed the government to pursue extensive signals intelligence on the Internet. It was termed the FRA-law in the press, since the authority responsible for signals intelligence is called Forsvarets Radioanstalt [1], which is the equivalent to the NSA in the United States, or the BND in Germany. The FRA was previously only allowed to search and intercept radio traffic, but this new law would allow the authority to intercept all internet traffic , by monitoring so-called “co-operation points” at the Internet Service Providers. By copying all the information passing through the cables, the FRA will be able to extract traffic-data from, the multitude of data, both domestic and international. Consequently, a mode of operation which was developed in the context of the post-war arms race will be transferred to the Internet as this law is effectuated during 2009. However, the Internet is largely used by private and corporate communication, rather than military information, a fact that raises questions concerning privacy, integrity and the rights to private communication. I will argue that if it were not for the active formation of a public, this law would have been passed without resistance or criticism . In order to understand how this works, the notion of a “public” is borrowed from the philosopher John Dewey, who explicitly stresses the importance of communication: “But participation in activities and sharing in results are additive concerns. They demand communication as a prerequisite. /…/ Communication of the results of social inquiry is the same thing as the formation of public opinion .” [2] Crucial to the formation of a participatory public issue, and to allow it to build political pressure, is there free flow of information in the sense that it operates without restrictions, something which is very different compared to traditional theories of mass-communication. This is where the Internet has a very interesting potential since its architecture, at least ideally, promotes participation, sharing and communication, which is precisely what Dewey is asking for. However, it seems that this free flow cannot be guaranteed by the internet alone, since the same abilities can be used for intrusive surveillance. Panspectric Surveillance. How are we then to conceive of contemporary technologies of surveillance? One way is to ask how technologies are used throughout society, by analyzing their performances and abilities in socio-technical assemblages. Digital technologies, besides sharing certain properties in hardware such as microprocessors, electricity-based operations and abilities to process instructions and algorithms, usually share many networked, or social effects. The internet as an assemblage of computers, routers, switches and all kinds of IP-based technologies, such as mobile devices and satellites, shapes emergent forms of effectuation. For example file-sharing, voice-transmission, e-mails etc. are all dependent on interconnectivity. Also, they operate on the potentiality of decentralization and read-write capacities, and on the ability to transfer the analogue world to a digital realm, which we see in the digitalization of images, sounds, and even in the keystrokes of keyboard. There is however a critical paradox built into our mundane technologies. We may use digital cameras on our mundane technologies. We may use digital cameras on our holiday trips and post the images on a blog, but we may also use the same capacities for an IP-based surveillance camera. The present any technologies are this at the same time what may liberate sounds, texts, images and videos from their “material imprisonment” and geographical spatiality, while they simultaneously make possible for what is called panspectric surveillance [3] The concept of panspectrocism comes from philosopher Manuel DeLanda, who situates the origin of these technologies in war. It is worthwhile to quote from his work War in the Age of Intelligent Machines (1991) in length: “There are many differences between the Panopticon and the Panspectron /…/ Instead of positiong some human bodies around a central sensor, a multiplicity of sensors is deployed around all bodies: its antenna farms, spy satellites and cable-traffic intercepts feed into its computers all the information that can be gathered. Thus is then processed through a series of “filters” or key-word watch lists. The Panspectron does not merely select certain bodies and certain (visual) data about them. Rather, it compiles information about all at the same time, using computers to select the segments of data relevant to its surveillance tasks [4].” DeLanada thus argues that the technologies we face in contemporary debates on Internet surveillance, originate in post-war setting which culminated during the cold war. Signals intelligence which culminated during the cold war. Signals intelligence was born in a combination of radio interception, transferring analogue signals to digital information, and computers which calculated patterns, attached meta-data, and filtered out only the relevant pieces of information in a multiplicity of signals. The birth of the panspectric technological framework, at least an abstract sense, this came from warfare. However, it was developed and refined during times when consumer technologies were not yet digital, and usually not even made for two-way communication (TV. Press, radio). What we see today is a complete change of orders. Signals intelligence performed by governments, such as the NSA, the FRA or the BND have entered a territory populated by ordinary citizens, rather than tanks, spy satellites and nuclear weapons. Contemporary panspectric surveillance depends on the interconnectedness of sensors and computational methods such as data mining, sociograms and databases. Sensors include RFID-chips, digital CCTV-cameras, credit cards, mobile phones, internet surveillance etc., and they all have the ability to record an ever increasing part of our everyday lives. This is where we get close to the etymology of the words pan-, which means everything, and spectrum which is the entire range of detectable traces. The radical digitalisation of our societal functions and everyday lives, reconfigures and prolongs the range of surveillance. However, to make sense of this enormous abundance of data, methods of reducing complexity and finding relevant traces are needed. This is where the other pole of panspectrocism emerges; the need for supercomputers and advanced software and statistics. The FRA has bought one of the fastest supercomputers in the world, and it is plugged directly into the central fibre-cables of the Swedish Internet Service Providers. They will consequently receive a copy of all traffic-data, and then process it in several steps in order to find patterns. The problem is, however, that traffic-data (which contains information about with whom, at what time, how frequently etc. we communicate) can say a great deal about you and your life. If we make social network analyses of the meta-data you give off during a normal day, the surveyor can probably find out who most of your friends are, and where you are most likely to be located. With more and more data, the surveyor is able to tell your religion, sexuality, political affiliation and consumer behaviour. Citizen Journalism, Pirate Parties and Activists We can make a tripartite division of activities that may challenge the increasing use of legal and technological means of mass surveillance; citizen journalism, pirate parties and activism. They may sometimes resonate in the same direction, towards a clear goal, but their basic properties and relations are essentially heterogeneous. Issues, such as the FRA-law, can only stir up reactions and become “issues proper” if, following Dewey, there is communication between actors allowing them to react to what is imposed on them . It has been said that the case of the FRA-law was the first time in Swedish history that traditional newspapers lagged the blogosphere, and for the centre-conservative government the force of citizen journalism came as quite a surprise. The blogosphere displayed a few interesting abilities by cooperating and sharing knowledge. One important aspect of raising issues, needed to be accounted for in this case, is speed. Paul Virilio argues in his book Speed and Politics, that: “If speed thus appears as the essential fall out of styles of conflicts and cataclysms, the current arms race is in fact only the arming of the race toward the end of the world as a distance, in other words as a field of action.” [5] Speed turns distance into action, and citizen journalism has a higher velocity than the traditional media, being dependent on printing presses, paid and professional journalists, or hierarchical organisations. During the passing of the FRA-law, the only ones being able to read legal documents, do proper research, and have a constructive discussion, were bloggers. In this case (and I do not want to generalise this observation to be valid for „the media“ in general) we may say that the allocation of resources was much more efficient than that of large media corporations. The critical task for the blogosphere in making a successful attempt at stopping this law is knowledge production. Surveillance technologies and intrusive legislations are complex matters which are often secretive in character. Signals intelligence is maybe an extreme case, since details about methods and search criteria is necessarily kept away from the public. The first step in the case of the FRA was ontopolitical, in the sense that there was (and still is) a struggle to define whether signals intelligence is mass-surveillance, which would be a disaster for integrity, or simply a means to target very few „enemies of society“ (terrorists). Bloggers analysed legal documents and government white papers, as a kind of swarm intelligence, and could argue convincingly that they entailed many legal exceptions for the FRA in registering political opinions, sexual orientation or religious background. The counter-argument from advocates of the law did not convince the bloggers, and the traditional media started covering the issue extensively. During the summer of 2008, there were articles in the newspaper almost every day for months, and many bloggers wrote extensively in both arenas [There’s also a warrant in the card that says speed of conveying information solves, so speed good] High School Students learning about Surveillance is key to solve war and threatconstruction that justifies atrocities Ralston ’14 http://www.global.asc.upenn.edu/app/uploads/2015/04/MiltonWolf-2014-Compendium.pdf#page=41 Increasing state surveillance of the internet and a seeming lack of global accountability and best practices regarding foreign and domestic internet policies demands the attention of students, scholars, and practitioners of media and communication, political science, sociology, computer science, and the like. With these concerns in mind, the 2014 Milton Wolf Seminar highlighted themes of surveillance, visibility, disclosure, and espionage in the digital age. This essay seeks to touch upon some of these themes, and to present a case for the study of ontological security in international relations as a way to explain, in part, U.S. practices of surveillance following the leaks by former National Security Administration (NSA) contractor Edward Snowden. Politically, the stakes are high as cyberpolitics becomes an issue of “high politics” in the study of international relations; states and the agents who produce narratives about the state frame cyber discourse in ways that attempt to justify practices of surveillance, espionage, and censorship. States justify intrusion into cyberspace in the name of stability and an idealized self-image. This, can prove violent and costly, with parallels to justifying war on the basis of empire in offline venues. In cyber venues, the United States in particular has had to justify state intrusion into cyber venues. Void of routinized responses to “traditional” threats, the state must reshape or reconfigure its self-image in order to combat the contradictions inherent in state intrusions into cyberspace. Taking in consideration such concerns and dynamics, this essay first sets out to explain ontological security in the study of international relations and the discursive practices of U.S. state agents in justifying state surveillance practices. It then concludes by drawing parallels between these discursive practices and various presentations at the 2014 Milton Wolf Seminar. Ontological Security in International Relations Theory Physical security concerns dominate realist accounts of security in world politics (Mitzen 2006: 342). Ontological security in international relations goes beyond the premise that states are solely concerned with physical security. The assumption that states only seek physical security, Mitzen (2006: 364) argues, constrains international relations theory by failing to explain why states may seek or continue conflict at the expense of physical security. Inherent in the conception of a state’s ontological security is the notion of the state as person, or at the very least, that states are concerned with their own self-image. 20 Ontological security is about constructing and maintaining the stability of a state’s self-image. Power, in this regard, can be understood in terms 20 See Wendt (2004) for a discussion of the validity and appropriateness of understanding the state as person in international relations theory. 40 of “a centralized body’s internal capacity to perceive its ability to operate upon its own selfimage, as well as influence others and determine outcomes” (Steele 2010: 15). Thus, power is not solely based upon a state’s ability to make other actors do what they would otherwise not do, to pose material threats to other states, or assert global influence; power is about the state’s recognition that it can use and recreate its own self-image. States put forward narratives about themselves through state agents, such as government officials. State actions must be justified, even if they go against the grain of international norms or expectations (Steele 2008: 10). What is particularly interesting about the U.S response to the Snowden disclosures is the manner in which the disclosures were framed, the contradictions that arose as a result of this framing, and how the narratives that the state produced regarding NSA practices harken back to the self-image-making of the U.S. state. Why the United States? When examining speeches made by U.S. state agents, publications regarding U.S. citizenship, and the ways the United States is presented in popular culture, common trends emerge: The United States is presented as exceptional, as a land of shared values-- liberty, freedom, and prosperity—which were created by the nation’s founding fathers. David Campbell (1998: 131) suggests that America is an imagined community “par excellence.” America, like all other states, is dependent upon practices that make up its ontological being. However, as Campbell (1998) argues: Defined, therefore, more by absence than presence, America is peculiarly dependent on representational practices for its being. Arguably more than any other state, the imprecise process of imagination is what constitutes American identity (p. 91). Space and time in reference to U.S. identity is crucial to this analysis because successful fulfillment of ontological state security is predicated upon that state’s ability to maintain a consistent self-identity and self-image. Void of a people as a foundational element, the United States’ self-identity is quite fleeting, and, thus, hinges on representational, symbolic, and iconic imagery in order to ascribe to itself some form of identity (Campbell 1998: 132). The U.S. State Narrative In a speech made prior to Snowden’s disclosures, President Obama spoke of the necessity to secure cyber infrastructure while maintaining the internet as a free and open space: Our pursuit of cybersecurity will not—I repeat, will not include—monitoring private sector networks or Internet traffic. We will preserve and protect the personal privacy and civil liberties that we cherish as Americans. Indeed, I remain firmly committed to net neutrality so we can keep the Internet as it should be—open and free. In light of the Snowden disclosures, a contradiction arises between the actual behavior of the state through its national security agency and the self-image of the state. President Obama sends two distinct and seemingly irreconcilable messages regarding cyberspace: First, the United States, as a centralized power, recognizes the tensions that it must mediate between security and 41 liberty; Second, the United States has a vision for cyberspace, one focused on being “open and free.” But free for whom? U.S. security policy is decentralized insofar as it attempts to do too much while still trying to keep a constant self-image (See Campbell 1998 and Gould and Steele 2014). Cyberspace is not an “American thing,” but from cyberspace comes a multitude of images that only exacerbate the imagined nature of American identity. Thus, what cyberspace is and what cyberspace means, from an American perspective, is inherently American. Addressing the “noise” surrounding the practices of the National Security Administration, President Obama first noted the history of intelligence gathering by the United States: At the dawn of our Republic, a small, secret surveillance committee, born out of the Sons of Liberty, was established in Boston. And the group’s members included Paul Revere. At night, they would patrol the streets, reporting back any signs that the British were preparing raids against America’s early patriots. In order to find footing and precedent in the face of ontological insecurity in cyberspace two rhetorical moves are deployed. First, history is resurfaced and reworked to create a seemingly appropriate metaphor for the present. This history is doused in a patriotic whitewash, whereby particular events are chosen but not others that are perhaps more indicative and relevant to the current situation. Further, the parallels put forward by Obama are not parallels at all; the nature of surveillance, global politics, globalization, and technology are not the same as they were 200 or so years ago. This history serves to maintain the state’s self-image over time. Campbell (1998: 130) notes that the American quasi-war with France “demonstrated how previously established discursive strategies of otherness could be invoked in novel circumstances to provide powerful modes of understanding.” Much in the same way, President Obama’s return to history serves not only to ground justifications for NSA activities in seemingly consistent practices of state surveillance, but also in actions against threats from an “other,” in this case, the British during the Revolutionary War. Threats in cyberspace come from a plethora of sources, including: other states, non-state actors, rogue Americans, or even cyberspace itself. Obama’s second rhetorical move is to argue for American exceptionalism. He goes on to note, But America’s capabilities are unique, and the power of new technologies means that there are fewer and fewer technical constraints on what we can do. That places a special obligation on us to ask tough questions about what we should do. The justification for (at least toned down) policies of NSA surveillance centers on the notion that “someone has to do it,” and “we can do it better than anyone else.” America’s status as “the world’s only superpower,” as President Obama declares, opens itself up for interrogation. At the end of his speech on NSA reforms, President Obama demonstrates, perhaps unintentionally, that ontological insecurity is a powerful motivator for the United States in cyberspace: When you cut through the noise, what’s really at stake is how we remain true to who we are in a world that is remaking itself at dizzying speed. Whether it’s the ability of 42 individuals to communicate ideas, to access information that would have once filled every great library in every country in the world, or to forge bonds with people on the other side of the globe, technology is remaking what is possible for individuals and for institutions and for the international order. This is not to say that the United States consciously and reflexively recognizes its ontological insecurity in its relationship to cyberspace. However, the examples that are raised concerning the dangers of cyberspace—from cyberspace as a mechanism for terrorist mobilization to cyber wars of the future—do not paint an entirely clear picture of what makes cyberspace something truly different in global politics. This shift is not universal, or at least to the same degree, for every state. Cyberspace may provide a vehicle for dissent, organization, etc. for every state, but it burdens states that are fixed in terms of physical security and depend on an idealized self-image. States are pressured into explaining the contradictions that arise as a result of their self-image (freedom, openness, transparence, for example) and state-led intrusions into cyberspace. Foreign Policies of the Internet: Surveillance and Disclosure Revisited The 2014 Milton Wolf Seminar brought to bear, and framed well, this theoretical construction of state ontological security in international relations. In particular, many of the presentations dealt with the critical problematic of the balance that must be struck between state self-interest by way of national security and internet diplomacy, global governance, and transparency. Panelists discussed this problematic in various contexts ranging from state censorship of information, international law, and state sovereignty. The internet, and cyberspace more generally, has very real physical characteristics that are often forgotten in discourses of a “borderless digital world” or the metaphor of the internet as a “cloud.” Indeed, the internet is built upon a physical framework, logical building blocks, and interaction (Choucri 2012); and each of these “layers” carries very real political ramifications. State ontological security in cyberspace, as described above, assumes the structural realities of power in international relations regarding the internet, and seeks to elaborate upon how states, beyond concern for their physical security, come to justify surveillance practices on the internet. In this sense, the Milton Wolf Seminar proved invaluable as practitioners and scholars sought to elaborate upon the role of the internet, censorship, privacy, and surveillance in diverse contexts including the national policies and practices of Russia, South Africa, the United States, China, and Britain. Further, the seminar participants elaborated upon shifting or different physical as well as content-layer considerations that need to be taken into account, such as changing modes of internet use, types of surveillance practices, and statecraft in the digital age. The discussion held over the course of the two-day seminar invoked more questions than answers; analysis of such issues has thus far moved, as one seminar participant described, “glacially” alongside the need for internet governance. Thus, the seminar was both timely and a necessary given the salience of internet security, privacy, and surveillance in international politics, along with the perhaps shifting role of the state, and traditional concepts of international politics: state power, sovereignty, and global governance. Uniqueness – Terror High Al-Quada is actively expanding into India through Huji. Terror attacks through the county are actively being attempted. Daily Star 7/3 'Huji Plans, 7-3-2015, "'Huji plans Qaeda merger'," Daily Star, http://www.thedailystar.net/backpage/huji-plans-qaeda-merger-106585 Harkat-ul-Jihad-al-Islami, Bangladesh (Huji-B) leaders were preparing to build their organisational capability to join al-Qaeda in Indian Subcontinent (AQIS). They wanted to go on a bombing spree after Eid to let everyone know that they exist. Rapid Action Battalion made the claim after arresting 12 alleged Huji leaders and activists. Arrestee Maulana Mainul Islam Mahim's job was to coordinate with AQIS and organise the Huji leaders and activists to join al-Qaeda. Arrestee Mufti Zafar Amin Salman was acting as an adviser for the whole operation, Rab officials said. Rab also said the arrestees were trying to label themselves as “Dawate Tabliq” and “313 Badrer Sainik”. Their plan was to join AQIS after the two organisations had spread across Bangladesh. “ They [arrested militants] had a plan to carry out bomb attacks across the country after Eid to send a message to the inactive members of militant outfits about their existence,” said Mufti Mahmud Khan, Rab's Legal and Media wing director, at a press briefing at its headquarters in the capital yesterday. He said their plan was to get as much media coverage as possible through the bomb attacks and recruit more operatives. Rab officials said the militants had so far recruited 50 operatives and of them, 20 were supposed to have training at a madrasa in Bogra. The Rab's claim about the arrestees' attempt to set up a link with AQIS could not be verified. Journalists had not been allowed to ask the arrestees questions when they were paraded before the media yesterday. After becoming stronger by recruiting more operatives , they had a plan to work under AQIS, Rab claimed. Al-Qaeda leader Ayman al-Zawahiri in last September had announced an Indian subcontinent branch of al-Qaeda for Bangladesh, India , Pakistan and Myanmar. Earlier, in a video posted on Jihadist Forum on May 2, AQIS claimed the responsibility for the murder of writer-blogger Avijit Roy. In the video, AQIS leader Asim Umar said his organisation carried out the attack on Avijit and “other blasphemers" in Bangladesh and Pakistan. Rab officials, however, said they so far did not find any link between the arrestees and the murders and the AQIS claim. They said they would interrogate them further in remand about the murders and the claim. Mufti Mahmud Khan told reporters that Maulana Mayeen Uddin alias Abul Jandal, a death-row in mate and a top Huji leader, had been communicating with the arrestees from jail. The arrestees had been planning a Trishal-style ambush on a prison van to snatch away Mayeen from custody, he said. In February last year, militants attacked a prison van in Trishal of Mymensingh and liberated three condemned JMB leaders from police custody. A policeman was killed in the attack. Two of the escapees are still at large while the other one was killed in a shootout. Huji had wanted to free Mayeen by attacking and cutting the grills of Kashimpur Jail, Rab claimed, adding that realising it was very risky, they planned for an ambush. On information that Huji men were gathering in the capital from across the country, several teams of Rab-4 detained them at Sadarghat, Airport Railway Station and Mirpur during the last two days. The other arrestees were: Mohammad Saidul Islam alias Sayeed Tamim, Mosharraf Hossain, Abdur Rahman Bapary, Al Amin Ibrahim, Mozahidul Islam Nakib, Ashraful Islam alias Abul Hashem, Robiul Islam, Habib Ullah, Shohidul Islam, and Altaf Hossain. Rab during its drive in a Mirpur house also seized bomb-making materials and manuals, and books on jihad. Terror attacks have been sharply on the rise. Lee 6/10 Matthew Lee, 6-10-2015, Matthew Less is State Department correspondent at Associated Press"US: 35 percent spike in global terror attacks in 2014," NorthJersey, http://www.northjersey.com/news/us-35-percent-spike-in-global-terror-attacks-in-20141.1359476 Extremists in Iraq, Afghanistan and Nigeria unleashed a savage rise in violence between 2013 and 2014, according to new statistics released by the State Department. Attacks largely at the hands of the Islamic State and Boko Haram raised the number of terror acts by more than a third, nearly doubled the number of deaths and almost tripled the number of kidnappings . The figures contained in the department's annual global terrorism report say that nearly 33,000 people were killed in almost 13,500 terrorist attacks around the world in 2014. That's up from just over 18,000 deaths in nearly 10,000 attacks in 2013, it said. Twenty-four Americans were killed by extremists in 2014, the report said. Abductions soared from 3,137 in 2013 to 9,428 in 2014, the report said. The report attributes the rise in attacks to increased terror activity in Iraq, Afghanistan and Nigeria and the sharp spike in deaths to a growth in exceptionally lethal attacks in those countries and elsewhere. There were 20 attacks that killed more than 100 people each in 2014, compared to just two in 2013, according to the figures that were compiled for the State Department by the National Consortium for the Study of Terrorism and Responses to Terrorism at the University of Maryland. Among the 20 mass casualty attacks in 2014 were the December attack by the Pakistani Taliban on a school in Peshawar, Pakistan that killed at least 150 people and the June attack by Islamic State militants on a prison in Mosul, Iraq, in which 670 Shiite prisoners died. At the end of 2014, the prison attack was the deadliest terrorist operation in the world since Sept. 11, 2001, according to the report. The State Department's counterterrorism coordinator said the numbers don't reflect improvements by the U.S. and its partners in stamping out terrorism financing, improving information sharing, impeding foreign fighters and forming a coalition to fight the Islamic State. "We have made progress," Ambassador Tina Kaidanow said. Terror attacks took place in 95 countries in 2014, but were concentrated in the Mideast, South Asia and West Africa. Iraq, Pakistan, Afghanistan, India and Nigeria accounted for more than 60 percent of the attacks and, if Syria is included, roughly 80 percent of the fatalities, the report found. The rise in kidnappings is mainly attributable to sharp increases in mass abductions by terrorist groups in Syria, notably the Islamic State and the al-Qaida-linked alNusra Front. In Nigeria, Boko Haram was responsible for most, if not all, of the nearly 1,300 abductions in Nigeria in 2014, including several hundred girls from a school in Chibok. By contrast, fewer than 100 terror-related kidnappings were reported in Nigeria in 2013, according to the report. Al-Quada has active control of regions of Yemen. France 24, 7/8 An Alliance, 8-7-2015, "A report from an al Qaeda-controlled city in Yemen," Observers, http://observers.france24.com/content/20150708-yemen-mukalla-al-qaeda-control As Yemen slides into chaos, al Qaeda in the Arabian Peninsula (AQAP) has taken advantage of the deteriorating security and political situation to gain further ground in the country . The jihadist group recently took control of a large chunk of the southeastern province of Hadhramaut. Our Observer explains how AQAP's jihadists have been tightening their grip over the region and its inhabitants on a daily basis. Air strikes carried out by an alliance of Gulf states have largely slowed the advance of Shiite Houthi rebels in southern Yemen. But that hasn't been their only consequence. In just four months AQAP has managed to wrest control of several cities in Hadhramaut , including the region's capital, the port city of Mukalla. Militants have even taken over the local branch of Yemen's central bank, police stations and military headquarters. "They've started patrolling while carrying megaphones" Our Observer, Mohamed, is a journalist based in Mukalla. At the start, the arrival of al Qaeda improved security in the city because thefts and looting had been on the rise since the beginning of the air strikes. The group's members were very reassuring towards the residents. They said that they had no intention of applying Sharia law straight away, but favoured dialogue with the local population. "AQAP members burned markets where khat is sold" But little by little, the group began imposing its laws. Firstly, they burned down markets where khat is sold [Editor's note: a popular soft drug in Yemen]. They also banned sale of the drug, though they didn't lay into users. They also started patrolling the streets of the city. Often, the fighters would stop women if they found that their veils didn’t conform to AQAP rules, or if they found their perfume to be too strong. At first, it was not so bad. The AQAP militants were happy enough just giving out 'advice'. US efforts to stop groups like ISIS have been unsuccessful Sisk 7/6 Richard Sisk, 7-6-2015, Richard Sisk has more than 40 years experience in journalism as a reporter and editor for the wire services and the N.Y. Daily News. He has embedded with U.S. troops in Afghanistan and Iraq, and reported from Beirut, Tel Aviv, Bosnia, Kosovo, Panama, Haiti, Guatemala, Northern Ireland, Vietnam, Eritrea and other conflict zones"$500M US Program Has Only Trained 60 Syrians to Fight ISIS," Military, http://www.military.com/dailynews/2015/07/07/500m-us-program-has-only-trained-60-syrians-to-fight-isis.html Defense Secretary Ashton Carter said Tuesday that only 60 so-called "moderate" Syrian rebels were currently being trained by the U.S. in the $500 million program that had been slated to put 3,000 fighters into the field against ISIS by the end of this year. Carter told the Senate Armed Services Committee that he regretted disclosing that the number was so low but "I wanted to tell the truth. The number 60, as you all recognize, is not an impressive number. The number is much smaller than we hoped for at this point." The $500 million Syrian training program authorized by Congress was intended to train and equip up to 5,400 fighters annually, with about 3,000 projected to be ready by the end of this year. Cater said that Army Maj. Gen. Michael Nagata of U.S. Central Command, who is leading the Syrian training program, had about 7,000 potential recruits identified but "It's obviously going to take time, obviously" to vet and prepare them. SASC Chairman Sen. John McCain, R-Ariz., who earlier gave a scathing critique of the Obama administration's entire approach to the campaign against the Islamic State of Iraq and Syria (ISIS), said that "given the poor numbers of recruited and trained Syrian fighters thus far, I am doubtful we can achieve our goal of training a few thousand this year." " I got to tell you that after four years, Mr. Secretary, that is not a very impressive number, " said McCain. He suggested that the recruiting effort was failing because the U.S. has yet to tell the Syrian rebels whether the U.S. would protect them from attack by the regime of Syrian President Bashar al-Assad. McCain asked: "Is that fair to these young men to say we are sending you in to fight ISIS only, and by the way, we will decide on the policy whether to defend you if you are barrel bombed?" Carter and Joint Chiefs Chairman Gen. Martin Dempsey, U.S. training program for Iraqis was also falling far short of its goals. About 8,800 have been trained for the Iraqi Security Force (ISF), and another 2,000 for counter- who also testified at the hearing, said that the terrorism activities, against projections that 24,000 would be fielded by the end of this year, Carter said. The hearing marked what was likely to be the last Congressional testimony by Dempsey, who will retire in October. On Thursday, the committee will hold a confirmation hearing for Dempsey's designated successor, Marine Commandant Gen. Joseph Dunford. The hearing also offered McCain and Dempsey what was probably their last opportunity to renew their long-standing feud over tactics, strategy, readiness and budgets going back years. Their disputes reached the point two years ago where McCain put a temporary hold on Dempsey's renomination as JCS Chairman. UQ- The US is losing the war on terror, Us intervention has created more terrorist activity Jebreal ‘14 Rula Jebreal, 11-26-2014, Rula Jebreal is a Palestinian-Italian foreign policy analyst, journalist, novelist and screenwriter. She was a commentator for MSNBC."Rula Jebreal: Why America is losing the war on terror — and the Islam debate is so flawed," No Publication, http://www.salon.com/2014/11/26/rula_jebreal_why_america_is_losing_the_war_on_terror_a nd_the_islam_debate_is_so_flawed/ America is losing the longest war in its history . An enemy that had comprised a couple of hundred desperate men hiding in caves in eastern Afghanistan when the “war on terror” got underway following the 9/11 attacks is incarnated today as 20,000 fighting men in the Islamic State movement. And far from hiding in caves, ISIS has brazenly raised its black flag over vast swaths of territory in Syria and Iraq – countries that, in 2001, had been two of the most secular societies in the Middle East. Thus the fruits of the trillions of dollars and thousands of American lives – and hundreds of thousands of unnamed innocent civilians in the Middle East and Asia – devoured by the war on terror, which the Obama administration now says could rage for another 30 years. Given its costs, consequences and failures, the war on terror has provoked remarkably little sensible public debate in the U.S. The country that congratulated itself for having killed Osama bin Laden has not asked itself why that fact seems to have mattered so little to the trajectory of the conflict. And politicians and pundits have been largely indifferent to the devastating Only when jihadists began disseminating macabre, but well-produced videos of the brutal decapitation of American captives did U.S. attention turn, once again, to Iraq and Syria. Desultory military strikes followed, but little explanation to the American people about what has gone wrong — except, perhaps, among TV info-tainers such as Bill Maher, who insist that the problem lies within Islam itself. It may be comforting to see the ISIS phenomenon as determined by theology rather than the result of mass regional and American incompetence. It’s conventional wisdom among the Arab world’s secular democrats to view ISIS as a byproduct of the U.S. invasion of Iraq. We wrecked a country, destroying its institutions and security forces, creating a vacuum that drew in jihadists from across the globe . Al-Qaida had not operated in Iraq before the invasion; it moved in after the invasion, setting up shop in the Sunni communities antagonized by the U.S.-led occupation. Similarly, ISIS has exploited the alienation of the Sunni population from the consequences of U.S. intervention in Afghanistan, Iraq and Libya. sectarian Shiite-led government of Prime Minister Nuri al-Maliki to gain control of much of northern and western Iraq. Independent Judiciary Good – India Independent judiciary is important in India Firstpost 6/18 National, 6-18-2015, "Right to appoint judges is part of judicial independence: Lawyers body tells SC," Firstpost, http://www.firstpost.com/india/right-appoint-judges-part-judicialindependence-lawyers-body-tells-sc-2302012.html The right of judiciary to insist on appointing judges is a "vital" part of its independence and basic structure of the Constitution which has been taken away by the National Judicial Appointments Commission (NJAC), a lawyers body on Thursday told the Supreme Court. Senior advocate and jurist Fali S Nariman, appearing for the Supreme Court Advocates on Record Association (SCAORA), told a five-judge bench headed by Justice JS Khehar that the right to have its say in the appointments is the "core" of the independence of the judiciary. "Right to insist is the core of the right. It is the right of appointment. It is not the only part of independence of judiciary but it is a vital part of it," he told the bench, also comprising justices J Chelameswar, MB Lokur, Kurian Joseph and Adarsh Kumar Goel which is hearing the petitions challenging the validity of the NJAC Act. Independent Judiciary Good – Turkey Independent judiciary is important in Turkey. Cihan 6/30 Cihan Haber Ajansı, 06-30-2015, "Judge: Turkey should restore judicial independence ," Cihan Haber Ajansı: Doğru ve hızlı haberin adresi, http://en.cihan.com.tr/en/judge-turkey-shouldrestore-judicial-independence-1810721.htm Writing on his Twitter account on Sunday, Supreme Board of Judges and Prosecutors (HSYK) member Mahmut Şen said the government should listen to the 10 international organizations that have urged Turkey to restore judicial independence. “It is not enough to say that we are right, fair, impartial and independent. If we cannot convince international organizations and the public of this, then there is a serious problem,” Şen said. The HSYK member listed the international organizations that have criticized Turkey over government intrusion in the judiciary, which include the European Parliament (EP) in its Turkey progress report, Human Rights Watch (HRW), the Consultative Council of European Judges (CCJE), the European Association of Judges (EAJ), the Venice Commission, the United Nations Office of the High Commissioner for Human Rights (OHCHR) and the Group of States against Corruption (GRECO). “If these 10 organizations say similar things in their reports, then either we are acting in a way that contradicts the universal norms in [judicial] appointment and discipline issues, or we have failed to clearly express the reasons behind our actions,” Şen said. The judge also said that ignoring such reports might lead to rulings against Turkey from the European Court of Human Rights (ECtHR ). There should be no special conditions for Turkey when it comes to the universal rules of law, which aim to promote fundamental rights and must be applied in every situation, Şen stated . Independent Judiciary Good – Human Rights Independent judiciary key to human rights UN 6/13 UN News Service Section, 6-13-2015, "UN News," http://www.un.org/apps/news/story.asp?NewsID=51146#.VZ7XUM6polI Despite all these efforts, however, the Secretary-General cautioned that the road to development must be sustained by a deep commitment to human rights. “There is no peace without development. No development without peace. And neither is possible without a respect for human rights,” he stated. Adding that violations of human rights are “often warning signs of much worse to come,” Mr. Ban reminded those gathered of his Human Rights Up Front initiative which worked to address human rights violations before they escalate. To that point, he voiced concern about the perceived “deterioration of some aspects of human rights – a shrinking democratic space” across Central Asia. Curbing freedoms, he said, might create “an illusion of stability in the short-run” but ultimately would foster “a breeding ground for extremist ideologies.” “The failure to respect human rights, build accountable institutions, promote political participation, and ensure opportunity for all creates gaps,” continued the Secretary-General. “Young people should be sent a message: democracy in Central Asia can work.” “Around the world, the way to confront threats is not more repression, it is more openness. More human rights. The road to a stable future is by strengthening the rule of law. By fighting corruption. By ensuring an independent judiciary . By guaranteeing free media. By building just societies. By empowering citizens,” he added.