Prism Affirmative Final - University of Michigan Debate Camp Wiki

advertisement
Prism Affirmative
1AC
Observation 1 – NSA Overreach
The NSA’s PRISM program is being used to collect surveillance
data from US companies – this overreach undermines US
credibility on internet freedom
Wheeler, 14 - Marcy Wheeler is an independent journalist and PhD from the
University of Michigan. She specializes in civil liberties, technology, and national
security. (Marcy, “The Drama Ahead: Google versus America” 6/16, http://www.catounbound.org/2014/06/16/marcy-wheeler/drama-ahead-google-versus-america
This leaves one central drama to play out, in which Google and other tech
companies (and to a much lesser extent, a few telecoms) begin to push back
against the NSA’s overreach. It’s not just that U.S. cloud (and other tech)
companies stand to lose billions as their clients choose to store data locally
rather than expose it easily to the NSA. It’s also that the NSA violated
several aspects of the deal the Executive Branch made six years ago with the
passage of the FISA Amendments Act (FAA), Section 702 of which authorizes
the PRISM program and domestic upstream collection. Congress passed the
FISA Amendments Act several years after the New York Times’ exposure of the illegal
wiretap program, ostensibly to address a technical problem used to justify that program.
Technology had changed since the analog and radio world in place when FISA was first
passed in 1978. Now, much of the world’s communications – including those of
extremists who were targeting America – were sitting in Google’s and
Yahoo’s and Microsoft’s servers within the United States. So Congress
authorized the NSA to conduct collection inside the United States on targets
located outside of the country (which swept up those who communicated with
those targets, wherever they were located). In exchange, the government and its
supporters promised, it would extend protections to Americans who were
overseas. Yahoo and Google played by the rules, as the PRISM slide released last
June revealed. The data of both Yahoo and Google have been readily available for any of
the broad uses permitted by the law since January 2009. Yet, in spite of the fact that
the NSA has a legal way to obtain this Internet data inside the United States
using PRISM, the government also broke in to steal from Yahoo and Google
fiber overseas. That’s an important implication of Sanchez’ point that “modern
communications networks obliterate many of the assumptions about the importance of
geography.” American tech companies now store data overseas, as well as in the United
States. Americans’ data is mixed in with foreigners’ data overseas. Many of
the more stunning programs described by Snowden’s documents – the
collection of 5 billion records a day showing cell location, NSA partner GCHQ’s
collection of millions of people’s intimate webcam images, and, of course, the theft of
data from Google and Yahoo’s servers – may suck up Americans’ records too. Plus
there’s evidence the NSA is accessing U.S. person data overseas. The agency
permits specially trained analysts to conduct Internet metadata contact chaining
including the records of Americans from data collected overseas. And in a Senate
Intelligence Committee hearing earlier this year, Colorado Senator Mark Udall asked
hypothetically what would happen with a “a vast trove of U.S. person
information” collected overseas; the answer was such data would not get
FISA protection (California Senator Dianne Feinstein, the Intelligence Committee
Chair, asked an even more oblique question on the topic). Udall and Feinstein’s
questions show that a lot of this spying does not undergo the oversight Benjamin Wittes
and Carrie Cordero point to. Last year, Feinstein admitted her committee gets less
reporting on such spying. Even for programs overseen by FISA, the NSA has
consistently refused to provide even its oversight committees and the FISA Court real
numbers on how many Americans get sucked into various NSA dragnets. Moreover, the
government’s threat to tech companies exists not just overseas. When a group of tech
companies withdrew their support for the USA Freedom Act, they argued the bill could
permit the resumption of bulk collection of Internet users’ data domestically. In the
past, that has always meant telecoms copying Internet metadata at telecom switches,
another outside entity compromising tech companies’ services. As with the data
stolen overseas, Internet metadata is available to the government legally
under PRISM. In response to the news that the government at times bypasses the
legal means it has to access Google’s clients’ data, the tech giant and others have found
new ways to protect their customers. That consists of the new encryption Sanchez
described – both of that fiber compromised overseas and of emails sent using Google –
but also the right to publish how much data the government collects. Even within the
criminal context, tech companies (including telecoms Verizon and AT&T) are
challenging the U.S. government’s efforts to use tech companies’ presence in the United
States to get easy access to customers’ data overseas. The conflict between Google and
its home country embodies another trend that has accelerated since the start of the
Snowden leaks. As the President of the Computer & Communications Industry
Association, Edward Black, testified before the Senate last year, the disclosure of
NSA overreach did not just damage some of America’s most successful
companies, it also undermined the key role the Internet plays in America’s
soft power projection around the world: as the leader in Internet
governance, and as the forum for open speech and exchange once
associated so positively with the United States. The U.S. response to Snowden’s
leaks has, to a significant degree, been to double down on hard power, on the imperative
to “collect it all” and the insistence that the best cyberdefense is an aggressive
cyberoffense. While President Obama paid lip service to stopping short of spying
“because we can,” the Executive Branch has refused to do anything – especially
legislatively – that would impose real controls on the surveillance system
that undergirds raw power. And that will likely bring additional costs, not just to
America’s economic position in the world, but in the need to invest in programs to
maintain that raw power advantage. Particularly given the paltry results the NSA has to
show for its domestic phone dragnet – the single Somali taxi driver donating to al-
Shabaab that Sanchez described. It’s not clear that the additional costs from doubling
down on hard power bring the United States any greater security.
Despite reforms within the US Freedom Act, the NSA can still
easily circumvent the new restrictions to access private data of
Americans
Savage, et al. 15
Charlie Savage, Winner of a Pulitzer Prize, Silver Gavel Award, and a Gerald R. Ford
Prize for Distinguished Reporting writing for the New York Times June 4, 2015.
“Hunting for Hackers, N.S.A. Secretly Expands Internet Spying at U.S. Border”
http://www.nytimes.com/2015/06/05/us/hunting-for-hackers-nsa-secretly-expandsinternet-spying-at-us-border.html?hp&action=click&pgtype=Homepage&module=firstcolumn-region&region=top-news&WT.nav=top-news //EM
Without public notice or debate, the Obama administration has
expanded the National Security Agency‘s warrantless surveillance of
Americans’ international Internet traffic to search for evidence of malicious
computer hacking, according to classified N.S.A. documents. In mid2012, Justice
Department lawyers wrote two secret memos permitting the spy agency to
begin hunting on Internet cables, without a warrant and on American soil, for
WASHINGTON —
data linked to computer intrusions originating abroad — including traffic that flows to suspicious Internet addresses or contains malware, the
documents show. The Justice Department allowed the agency to monitor only addresses and “cybersignatures” — patterns associated with computer
the documents also note that the N.S.A. sought
permission to target hackers even when it could not establish any links to
foreign powers. The disclosures, based on documents provided by Edward
J. Snowden, the former N.S.A. contractor, and shared with The New York Times and ProPublica, come at a
intrusions — that it could tie to foreign governments. But
time of unprecedented cyberattacks on American financial institutions, businesses and government agencies, but also of greater scrutiny of secret legal
While the Senate passed legislation this week limiting
some of the N.S.A.’s authority, the measure involved provisions in the
U.S.A. Patriot Act and did not apply to the warrantless wiretapping
program. Government officials defended the N.S.A.’s monitoring of
suspected hackers as necessary to shield Americans from the increasingly
aggressive activities of foreign governments. But critics say it raises
difficult tradeoffs that should be subject to public debate. The N.S.A.’s activities run “smack
justifications for broader government surveillance.
into law enforcement land,” said Jonathan Mayer, a cybersecurity scholar at Stanford Law School who has researched privacy issues and who reviewed
several of the documents. “That’s a major policy decision about how to structure cybersecurity in the U.S. and not a conversation that has been had in
It is not clear what standards the agency is using to select targets. It can
be hard to know for sure who is behind a particular intrusion — a foreign
government or a criminal gang — and the N.S.A. is supposed to focus on foreign intelligence, not law enforcement.
The government can also gather significant volumes of Americans’
information — anything from private emails to trade secrets and business
dealings — through Internet surveillance because monitoring the data
flowing to a hacker involves copying that information as the hacker steals it.
public.”
One internal N.S.A. document notes that agency surveillance activities through “hacker signatures pull in a lot.” Brian Hale, the spokesman for the
It should come as no surprise that the U.S.
government gathers intelligence on foreign powers that attempt to
Office of the Director of National Intelligence, said, “
penetrate U.S. networks and steal the private information of U.S. citizens
and companies.” He added that “targeting overseas individuals engaging in hostile cyberactivities on behalf of a foreign power is a
lawful foreign intelligence purpose.” The effort is the latest known expansion of the N.S.A.’s
warrantless surveillance program, which allows the government to
intercept Americans’ cross border communications if the target is a
foreigner abroad. While the N.S.A. has long searched for specific email addresses and phone numbers of foreign intelligence targets,
the Obama administration three years ago started allowing the agency to search its communications streams for less identifying Internet protocol
addresses or strings of harmful computer code. The surveillance activity traces to changes that began after the Sept. 11 terrorist attacks. The
government tore down a wall that prevented intelligence and criminal investigators from sharing information about suspected spies and terrorists. The
barrier had been erected to protect Americans’ rights because intelligence investigations use lower legal standards than criminal inquiries, but policy
makers decided it was too much of an obstacle to terrorism investigations. The N.S.A. also started the warrantless wiretapping program, which caused
an outcry when it was disclosed in 2005. In 2008, under the FISA Amendments Act, Congress legalized the surveillance program so long as the agency
targeted only noncitizens abroad. A year later, the new Obama administration began crafting a new cybersecurity policy. That effort included weighing
whether the Internet had made the distinction between a spy and a criminal obsolete. “Reliance on legal authorities that make theoretical distinctions
between armed attacks, terrorism and criminal activity may prove impractical,” the White House National Security Council wrote in a classified annex
to a policy report in May 2009, which was included in the N.S.A.’s internal files. About that time, the documents show, the N.S.A. — whose mission
includes protecting military and intelligence networks against intruders — proposed using the warrantless surveillance program for cybersecurity
purposes. The agency received “guidance on targeting using the signatures” from the Foreign Intelligence Surveillance Court, according to an internal
newsletter. In May and July 2012, according to an internal timeline, the Justice Department granted its secret approval for the searches of cyber
signatures and Internet addresses. The Justice Department tied that authority to a preexisting approval by the secret surveillance court permitting the
government to use the program to monitor foreign governments. That limit meant the N.S.A. had to have some evidence for believing that the hackers
were working for a specific foreign power. That rule, the N.S.A. soon complained, left a “huge collection gap against cyberthreats to the nation” because
Different computer
intruders can use the same piece of malware, take steps to hide their
location or pretend to be someone else. So the N.S.A., in 2012, began
pressing to go back to the surveillance court and seek permission to use the
program explicitly for cybersecurity purposes. That way, it could monitor
international communications for any “malicious cyberactivity,” even if it
did not yet know who was behind the attack. The newsletter described the further expansion as one of the
it is often hard to know exactly who is behind an intrusion, according to an agency newsletter.
“highest priorities” of the N.S.A. director, Gen. Keith B. Alexander. However, a former senior intelligence official said that the government never asked
the court to grant that authority. Meanwhile, the F.B.I. in 2011 had obtained a new kind of wiretap order from the secret surveillance court for
cybersecurity investigations, permitting it to target Internet data flowing to or from specific Internet addresses linked to certain governments. To carry
out the orders, the F.B.I. negotiated in 2012 to use the N.S.A.’s system for monitoring Internet traffic crossing “chokepoints operated by U.S. providers
through which international communications enter and leave the United States,” according to a 2012 N.S.A. document. The N.S.A. would send the
The disclosure that the N.S.A. and the
F.B.I. have expanded their cybersurveillance adds a dimension to a
recurring debate over the post Sept. 11 expansion of government spying
powers: Information about Americans sometimes gets swept up
incidentally when foreigners are targeted, and prosecutors can use that
information in criminal cases. Citing the potential for a copy of data
“exfiltrated” by a hacker to contain “so much” information about
Americans, one N.S.A. lawyer suggested keeping the stolen data out of the agency’s regular repository for information collected by
intercepted traffic to the bureau’s “cyberdata repository” in Quantico, Va.
surveillance so that analysts working on unrelated issues could not query it, a 2010 training document showed. But it is not clear whether the agency or
the F.B.I. has imposed any additional limits on the data of hacking victims. In a response to questions for this article, the F.B.I. pointed to its existing
procedures for protecting victims’ data acquired during investigations, but also said it continually reviewed its policies “to adapt to these changing
threats while protecting civil liberties and the interests of victims of cybercrimes.” None of these actions or proposals had been disclosed to the public.
As recently as February, when President Obama spoke about cybersecurity at an event at Stanford University, he lauded the importance of transparency
but did not mention this change. “The technology so often outstrips whatever rules and structures and standards have been put in place, which means
that government has to be constantly selfcritical and we have to be able to have an open debate about it,” Mr. Obama said.
Observation 2 – Multistakeholder model Good
NSA overreach is destroying the push for a multistakeholder model, which
risks data localization
The perception that the NSA is using Executive Order 12333 to
circumvent section 702 of the FISA Amendments Act is causing a
backlash against US tech companies and driving global data
localization
Eoyang, 14 - Mieke Eoyang is the Director of the National Security Program at Third
Way, a center-left think tank. She previously served as Defense Policy Advisor to
Senator Edward M. Kennedy, and a subcommittee staff director on the House
Permanent Select Committee on Intelligence, as well as as Chief of Staff to Rep. Anna
Eshoo (D-Palo Alto) (“A Modest Proposal: FAA Exclusivity for Collection Involving U.S.
Technology Companies” Lawfare, 11/24, http://www.lawfareblog.com/modestproposal-faa-exclusivity-collection-involving-us-technology-companies
Beyond 215 and FAA, media reports have suggested that there have been collection programs that occur outside of the companies’
knowledge. American
technology companies have been outraged about media
stories of US government intrusions onto their networks overseas, and the
spoofing of their web pages or products, all unbeknownst to the companies.
These stories suggest that the government is creating and sneaking through a back door to take the data. As one tech employee said
to me, “the back door makes a mockery of the front door.” As
a result of these allegations, companies
are moving to encrypt their data against their own government; they are
limiting their cooperation with NSA; and they are pushing for reform.
Negative international reactions to media reports of certain kinds of intelligence collection abroad have
resulted in a backlash against American technology companies, spurring
data localization requirements, rejection or cancellation of American
contracts, and raising the specter of major losses in the cloud computing
industry. These allegations could dim one of the few bright spots in the American economic recovery: tech. Without
commenting on the accuracy of these media reports, the perception is still a problem even if the
media reports of these government collection programs are not true---or are only partly true.
The tech industry believes them to be true, and more importantly, their
customers at home and abroad believe them to be true, and that means they have
huge impact on American business and huge impact as well on the
relationship between these businesses and an intelligence community that
depends on their cooperation. So, how should we think about reforms in response to this series of allegations the Executive Branch
can’t, or won’t, address? How
about making the FAA the exclusive means for
conducting electronic surveillance when the information being collected is
in the custody of an American company? This could clarify that the
executive branch could not play authority shell-games and claim that
Executive Order 12333 allows it to obtain information on overseas non-US
person targets that is in the custody of American companies, unbeknownst to those
companies. As a policy matter, it seems to me that if the information to be acquired is in the
custody of an American company, the intelligence community should ask
for it, rather than take it without asking. American companies should be entitled to a higher degree of
forthrightness from their government than foreign companies, even when they are acting overseas. Under the FAA, we
have a statutory regime that creates judicial oversight and accountability to
conduct electronic surveillance outside the US for specific purposes: foreign
intelligence (or traditional espionage), counter-terrorism, and prevention of WMD proliferation. It addresses protections for both
non-US and US persons. It creates a front-door, though compelled, relationship under which the intelligence community can receive
communications contents without individual warrants but with programmatic judicial oversight. FAA
exclusivity
would say to the rest of the world that when the US conducts bulk electronic
surveillance overseas, we are doing so for a particular, national security
purpose. The FAA structure with FISC review provides an independent
check that the statutory purposes are met. Through transparency agreements with the government,
the American companies are able to provide their customers with some sense of how many requests are made. This would
not change the 12333 authorities with respect to non-US companies. It would also
not change 12333 authorities when the Executive Branch seeks to obtain the information in some other way than through the US
company (i.e. breaking into the target’s laptop, parking a surveillance van outside their house, sending a spy, etc.). Some have asked
me what would happen if foreign companies tried to set up shop here in the US to seek these protections. I need to refine this part
further, but would look to other statutory regimes that need to define the nationality of companies, like the Foreign Corrupt
Practices Act, or the CFIUS process. Executive Order 12333 itself offers a partial answer, defining a US person to include “a
corporation incorporated in the United States, except for a corporation directed and controlled by a foreign government or
governments.” Others may argue that FAA provides inadequate civil liberties protections. This proposal says nothing about the
adequacy of that statute. What it says is that for
data held by an American company about a
target that is not a US person, the checks within FAA are stronger than
those under 12333 acting alone.
That perception prevents the US from stopping data localization
globally and helping those express their thoughts throughout the
world
Kehl, 14 – Policy Analyst at New America’s Open Technology Institute (Danielle,
“Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom &
Cybersecurity” July, https://www.newamerica.org/oti/surveillance-costs-the-nsasimpact-on-the-economy-internet-freedom-cybersecurity/)
Costs to the Internet Freedom Agenda and U.S. Credibility in Internet Governance “As the birthplace for so many of these
technologies, including the internet itself, we have a responsibility to see them used for good,” declared Secretary of State Hillary
Clinton in January 2010.175 Her speech at the Newseum in Washington DC effectively launched the United States’
Internet Freedom agenda, articulating a leading role for the U.S. in using
the Internet to promote freedom of expression, freedom of worship, and
the freedom to connect around the world. Clinton went on to give two other major addresses on
Internet Freedom, becoming the first global leader to emphasize Internet Freedom as a foreign policy priority and urging “countries
everywhere… to join us in the bet we have made, a bet that an open internet will lead to stronger, more prosperous countries.”176 As
Richard Fontaine and Will Rogers describe in a seminal paper on the subject in June 2011, “Internet
Freedom, broadly
defined, is the notion that universal rights, including the freedoms of expression,
assembly and association, extend to the digital sphere.”177 Although there were questions from the
beginning about whether the United States would hold itself to the same high standards domestically that it holds others to
internationally,178 the
American government has successfully built up a policy and
programming agenda in the past few years based on promoting an open
Internet.179 These efforts include raising concerns over Internet repression
in bilateral dialogues with countries such as Vietnam and China,180 supporting initiatives
including the Freedom Online Coalition, and providing over $120 million in
funding for “groups working to advance Internet freedom – supporting countercensorship and secure communications technology, digital safety training, and policy and research programs for people facing
Internet repression.”181 However,
the legitimacy of these efforts has been thrown into
question since the NSA disclosures began. “Trust has been the principal casualty in this unfortunate
affair,” wrote Ben FitzGerald and Richard Butler in December 2013. “The American public, our
nation’s allies, leading businesses and Internet users around the world are
losing faith in the U.S. government’s role as the leading proponent of a free,
open and integrated global Internet.”182 Prior to the NSA revelations, the United States was already
facing an increasingly challenging political climate as it promoted the Internet Freedom agenda in global Internet governance
conversations. At the 2012 World Conference on International Telecommunications (WCIT), the U.S. and diverse group of other
countries refused to sign the updated International Telecommunications Regulations based on concerns that the
document pushed for greater governmental control of the Internet and
would ultimately harm Internet Freedom.183 Many observers noted that the split hardened the
division between two opposing camps in the Internet governance debate: proponents of a status quo
multistakeholder Internet governance model, like the United States, who
argued that the existing system was the best way to preserve key online
freedoms, and those seeking to disrupt or challenge that multistakeholder
model for a variety of political and economic reasons, including
governments like Russia and China pushing for greater national
sovereignty over the Internet.184 Many of the proposals for more
governmental control over the network could be understood as attempts by
authoritarian countries to more effectively monitor and censor their
citizens, which allowed the U.S. to reasonably maintain some moral high
ground as its delegates walked out of the treaty conference.185 Although few stakeholders seemed particularly pleased by the
outcome of the WCIT, reports indicate that by the middle of 2013 the tone had shifted in a more collaborative and positive direction
following the meetings of the 2013 World Telecommunications/ICT Policy Forum (WTPF) and the World Summit on Information
Society + 10 (WSIS+10) review.186 However,
the Internet governance conversation took a
dramatic turn after the Snowden disclosures. The annual meeting of the Freedom Online
Coalition occurred in Tunis in June 2013, just a few weeks after the initial leaks. Unsurprisingly, surveillance dominated the
conference even though the agenda covered a wide range of topics from Internet access and affordability to cybersecurity.187
Throughout the two-day event, representatives from civil society used the platform to confront and criticize governments about their
monitoring practices.188 NSA
surveillance would continue to be the focus of
international convenings on Internet Freedom and Internet governance for
months to come, making civil society representatives and foreign
governments far less willing to embrace the United States’ Internet Freedom
agenda or to accept its defense of the multistakeholder model of Internet governance as a anything other than self-serving.
“One can come up with all kinds of excuses for why US surveillance is not
hypocrisy. For example, one might argue that US policies are more benevolent than those of many other regimes… And one
might recognize that in several cases, some branches of government don’t know what other branches are doing… and therefore US
policy is not so much hypocritical as it is inadvertently contradictory,” wrote Eli Dourado, a researcher from the Mercatus Center at
George Mason University in August 2013. “But
the fact is that the NSA is galvanizing
opposition to America’s internet freedom agenda.”189 The scandal revived
proposals from both Russia and Brazil for global management of technical
standards and domain names, whether through the ITU or other avenues. Even developing
countries, many of whom have traditionally aligned with the U.S. and prioritize
access and affordability as top issues, “don’t want US assistance because they assume the
equipment comes with a backdoor for the NSA. They are walking straight
into the arms of Russia, China, and the ITU.”190 Consequently, NSA surveillance has shifted the
dynamics of the Internet governance debate in a potentially destabilizing manner. The Snowden revelations
“have also been well-received by those who seek to discredit existing
approaches to Internet governance,” wrote the Center for Democracy & Technology’s Matthew Shears.
“There has been a long-running antipathy among a number of stakeholders to the United States government’s perceived control of
the Internet and the dominance of US Internet companies. There has also been a long-running antipathy, particularly among some
governments, to the distributed and open management of the Internet.”191 Shears points out that evidence of the NSA’s wideranging capabilities has fueled general concerns about the current Internet governance system, bolstering the arguments of those
calling for a new government-centric governance order. At the UN Human Rights Council in September 2013, the representative
from Pakistan—speaking on behalf of Cuba, Venezuela, Zimbabwe, Uganda, Ecuador, Russia, Indonesia, Bolivia, Iran, and China—
explicitly linked the revelations about surveillance programs to the need for reforming Internet governance processes and
institutions to give governments a larger role.192 Surveillance issues continued to dominate the conversation at the 2013 Internet
Governance Forum in Bali as well, where “debates on child protection, education and infrastructure were overshadowed by
widespread concerns from delegates who said the public’s trust in the internet was being undermined by reports of US and British
government surveillance.”193 Further complicating these conversations is the fact that several
of the institutions
that govern the technical functions of the Internet are either tied to the
American government or are located in the United States. Internet governance scholar
Milton Mueller has described how the reaction to the NSA disclosures has become entangled in an already contentious Internet
governance landscape. Mueller argues that, in addition to revealing the scale and scope of state surveillance and the preeminent role
of the United States and its partners, the
NSA disclosures may push other states toward a
more nationally partitioned Internet and “threaten… in a very fundamental way the claim that the US
had a special status as neutral steward of Internet governance.”194 These concerns were publicly voiced in October 2013 by the
heads of a number of key organizations, including the President of the Internet Corporation for Assigned Names and Numbers
(ICANN) and the chair of the Internet Engineering Task Force (IETF), in the Montevideo Statement on the Future of Internet
Cooperation. Their statement expressed “strong concern over the undermining of the trust and confidence of Internet users globally
due to recent revelations of pervasive monitoring and surveillance” and “called for accelerating the globalization of ICANN and
Internet Assigned Numbers Authority (IANA) functions, towards an environment in which all stakeholders, including all
governments, participate on an equal footing.”195 In particular, the process of internationalizing ICANN—which has had a
contractual relationship with the Commerce Department’s National Telecommunications and Information Association (NTIA) since
1998—has progressed in recent months.196
(Insert Scenarios)
Plan
The United States federal government should limit domestic surveillance of American
corporations exclusively to authority under section 702 of the FISA Amendments Act,
subject to the additional use restrictions in Presidential Policy Directive 28.
Observation 3 – Solvency
The plan’s curtailment of surveillance of U.S. companies to
exclusive section 702 authority is vital to restoring domestic and
international trust in surveillance
Eoyang and Bishai, 15 - *Mieke Eoyang is the Director of the National Security
Program at Third Way, a center-left think tank. She previously served as Defense Policy
Advisor to Senator Edward M. Kennedy, and a subcommittee staff director on the House
Permanent Select Committee on Intelligence, as well as as Chief of Staff to Rep. Anna
Eshoo (D-Palo Alto); **Chrissy Bishai is a Fellow at Third Way (“Restoring Trust
between U.S. Companies and Their Government on Surveillance Issues” 3/19,
http://www.thirdway.org/report/restoring-trust-between-us-companies-and-theirgovernment-on-surveillance-issues
Fixing the Problem Means Changing the Existing Legal Framework Currently, the
U.S. collects electronic
communications under four main authorities. Four Main Authorities on Electronic
Communication For collection occurring under both 215 and 702, the companies
would have been served with an order compelling production of their data.
But outside the U.S., Executive Order 12333,15 the long-standing guidance
for foreign intelligence activities, would govern the kind of collection that
has caused international outrage. E.O. 12333, signed by President Reagan, set the ground
rules and authorization for foreign intelligence collection when the nation’s primary
security threat was the Soviet Union. At that time, traditional intelligence activities would have been focused on other nationstates—identifying their spies, trying to recruit spies for the U.S., and trying to steal other countries’ secrets while protecting our
own. But the growth of terrorist groups’ capabilities, and particularly the 9/11 attacks, helped dissolve the separation between
traditional overseas espionage and counter-terrorism. As the nation was grappling with new threats posed by terrorism, people
around the world were sharing more and more of their information online and using mostly American companies to do so. Yet the
legal framework that had once recognized privacy rights was ill-suited to the Internet Age. The Intelligence Community’s traditional
position that constitutional rights like the Fourth Amendment’s privacy protections didn’t apply to non-Americans outside the U.S.
might have been clear when travelling and communicating internationally were more difficult. But
today’s freeflowing movement of people and data means that the “nationality” of an
individual’s communications is far less obvious.16 While extending
constitutional or privacy protections to foreigners abroad is a tricky legal
proposition, for many their data is being held by entities that are entitled to
the due process and privacy protections of the U.S. Constitution: American
companies. Our tech firms often act as custodians of other people’s data, and
as such don’t have the same heightened privacy interests as the targets of that data. But accessing the companies’
data without even giving notice to the owner of the servers raises serious
constitutional questions. As a politician once famously noted, “corporations are people too.”17 As a legal (if
not political) matter, he was right—these American tech companies are “U.S. Persons,”
and they therefore should know when the government seeks to access the
data they possess. The companies should be entitled to notice, especially since they can be compelled to cooperate with
law enforcement requests to hand over user data. Those protections should hold true regardless of whether the user data sought by
the U.S. government is that of Americans or non-Americans. In addition to those privacy protections that all U.S. persons enjoy
under the Constitution, both at home and abroad, surveillance reform should meet the following principles when dealing with
information about or from Americans: The U.S. government should have a process, consistent with the Constitution, to acquire from
companies the information that it needs to secure the country. The U.S. government should have a national security reason to collect
the information that it requests. U.S. companies should not have to fear unauthorized access to their data or products from their
own government. Any process to acquire information from U.S. companies should have safeguards to prevent misuse or intentional
over-collection. The Solution Include Overseas Collection from American Companies in Existing Statutory Frameworks In order to
meet the principles above, we
propose that FAA’s 702 framework be the exclusive
means for conducting electronic surveillance when the information is in the
custody of an American company (“FAA Exclusivity”). Section 702 of FAA provides procedures to authorize
data collection of foreign targets reasonably believed to be outside the U.S. It empowers the Attorney General (AG) and Director of
National Intelligence (DNI) to jointly certify a high volume of targeting and does not require the requesters to identify specific nonU.S. persons who will be targeted. Under this 702 framework, information on foreigners that’s in the custody of a U.S. company
should be subject to the following rules: The data must relate to targets “reasonably believed” to be outside the U.S. (can include
foreign persons, governments or their factions and similar entities). The AG and DNI must jointly submit annual “certifications” to
the Foreign Intelligence Surveillance Court (FISC). Certifications must identify categories of foreign intelligence targets that the
Government wants to surveil electronically; they do not need to identify specific persons to be targeted. Certifications may include
information or representations from other federal agencies authorized to cooperate with the AG, DNI, or Director of the NSA.
Certifications must be reviewed by the FISC, which can authorize the targeting if they deem that the statutory requirements have
been met. After the certifications are approved, the AG and DNI issue (written) “directives” to the providers, ordering them to assist
the government. Collection should be executed with the appropriate “minimization procedures” in place to limit the acquisition,
retention, and dissemination of any non–publicly available U.S. person information acquired through the Section 702 program. The
AG, in consultation with the DNI, must adopt FISC-approved targeting and minimization procedures that are “reasonably designed”
to ensure that the Government does not collect wholly domestic communications, and that only persons outside the U.S. are
surveilled. The AG and DNI must also create acquisition guidelines (which are not subject to FISC approval). Advantages of an FAA
Framework Shifting
the legal authority for collection of data in the custody of an
American company from E.O. 12333 to an FAA framework would have a number of
advantages. Most importantly, it would create a way for the government to get the data it
needs from American companies while giving those firms assurances that
their data would not be accessed in other unauthorized ways. In particular, the
FAA framework would create specific purposes for which the information
could be sought, rather than allow the indiscriminate scooping up of every
aspect of a person’s communications. FAA’s stated purpose is to acquire
foreign intelligence information, which it defines as "information that relates to the ability of the U.S. to
protect against an actual or potential attack by a foreign power; sabotage, international terrorism, or the proliferation of weapons of
mass destruction by a foreign power; or clandestine intelligence activities by a foreign power." The
FAA framework
would also create a requirement that the Executive Branch explain how the
information sought meets the statutory purposes. And there would be the
additional check of an independent judge who would review the
certifications and issue directives. Though this process is ex parte, and therefore a potential rubber stamp
for the government, there have been no documented instances of intentional abuses of the system in seeking information beyond the
statutory purposes. Finally, the
FAA framework would subject information sought from
U.S. companies to the statutory oversight requirements of the law. These are
extensive and explicit.18 In addition to FAA’s inherent protections, FAA Exclusivity would send a
powerful message to the rest of the world: when the U.S. conducts
electronic surveillance overseas from American companies, it is doing so
for a particular national security purpose. The FAA structure with FISC
review provides an independent check that the statutory purposes are met.
Through transparency agreements with the government, the American
companies would be able to provide their customers with some sense of
how many requests are made. FAA Exclusivity would not change the E.O. 12333 authorities with respect to
non-U.S. companies. It would not change E.O. 12333 authorities when the Executive Branch seeks to obtain the information in some
way other than through a U.S. company that holds the data (i.e. traditional espionage, like breaking into a target’s laptop, parking a
surveillance van outside their house, or sending a spy, would still be permissible). Of course, FAA Exclusivity wouldn’t solve every
problem. It would not prevent foreign governments from collecting information themselves and then providing it to U.S. intelligence
agencies, as U.S. law cannot bind a foreign government. And some
may argue that FAA provides
inadequate civil liberties protections for Americans. This proposal says nothing about the adequacy of
that statute in this respect. What it says is that for
data held by an American company about a
target that is not a U.S. person, the checks within FAA are stronger than
those solely under E.O. 12333. Others have argued that the FAA shifts the burden of cooperation solely onto
the company, which will suffer greater reputational harm as a more witting participant in affirmatively granting the government’s
requests. However, companies have suffered reputational harm as a result of allegations of unwitting cooperation. Making the
cooperation known, even if it’s secret, gives the companies the opportunity to account for it in their own planning. The move by
certain U.S. companies to place subsidiaries in foreign ownership to resist requests by the U.S. government presents an interesting
twist on this idea. In shifting the balance back to increased protections for U.S. companies, this legislation would change the
incentives so that claiming U.S. law would have operational advantages in giving companies uniformity of law for all their data. This
would also encourage the use of a single choice of law for all data governed by a company—that of the nationality of incorporation—
rather than encouraging a choice of law patchwork to govern the data as it flows around the world. Finally, some foreign
multinational companies operating in the U.S. and abroad may argue that this is inconsistent with principles that we treat all
companies operating in the U.S. the same way for purposes of law. While that would remain true under this proposal, it would create
a difference in how the U.S. treats U.S. companies operating abroad compared to how it treats foreign companies abroad. But
stretching the U.S. Constitution to foreign companies abroad is to stretch the document too far. If, on the other hand, those
companies see advantage in changing their nationality to U.S. in order to claim protections of those laws, then that is the corporate
version of the kind of immigration patterns that America has seen since its founding. Conclusion Using
FAA’s
framework as the exclusive means to access data that U.S. companies are
holding will give the Intelligence Community a statutory framework to be
able to get the intelligence information that it needs to protect the nation
while restoring the trust relationship between the companies and our
government. In addition, it will help restore the faith of foreign governments and
customers that when American companies are acting overseas, they bring
with them American values, including those of privacy protections.
Applying the restrictions of PPD-28 to section 702 eliminates all
negative perceptions of overbreadth
Nojeim, 14 - Director, Project on Freedom, Security & Technology at the Center for
Democracy & Technology (Greg, “COMMENTS TO THE PRIVACY AND CIVIL
LIBERTIES OVERSIGHT BOARD REGARDING REFORMS TO SURVEILLANCE
CONDUCTED PURSUANT TO SECTION 702 OF FISA” 4/11)
To address the problem of overbreadth in Section 702 collection, PCLOB
should recommend that Section 702 surveillance be conducted only for
carefully defined national security purposes. While there are different ways to do this, the
best way would be to turn the “use restrictions” in PPD-28 that govern bulk
collection into the permissible purposes for Section 702 surveillance. This
would require that collection pursuant to Section 702 only occur for
purposes of detecting and countering: (1) espionage and other threats and
activities directed by foreign powers or their intelligence services against the United States and
its interests, (2) threats to the United States and its interests from terrorism, (3) threats to the United States
and its interests from the development, possession, proliferation, or use of weapons of mass
destruction, (4) cybersecurity threats, (5) threats to U.S. or allied Armed Forces
or other U.S or allied personnel, and (6) transnational criminal threats, including illicit finance and
sanctions evasion related to the other purposes named above. This change would provide significant
comfort to non-U.S. persons abroad who are concerned about the impact on
their human rights that Section 702 surveillance would otherwise have. Indeed,
it would increase the likelihood that Section 702 surveillance would meet
human rights standards. It would also focus Section 702 surveillance on
true national security threats and still provide significant leeway to
intelligence officials. We note that each time intelligence officials at the March 19 PCLOB
hearings on Section 702 described the DNI certifications that identify the categories of foreign
intelligence information that may be collected pursuant to Section 702, they
mentioned one of these six categories of information. Another way to limit to national
security the purposes for collection pursuant to Section 702 would be to remove “the conduct of foreign affairs” as a basis for
collection. If adopted, this reform would permit collection under Section 702 for the purpose of obtaining (1) information that
relates to the ability of the U.S. to protect against a hostile attack, espionage, sabotage or international terrorism or proliferation of
weapons of mass destruction, or (2) information with respect to a foreign territory or foreign power (a foreign government, political
party, or entity controlled by a foreign government, or a foreign terrorist organization) that relates to the security of the U.S. Such a
change would be consistent with the stated counterterrorism purpose of Section 702. Refining
the purpose for
which surveillance under Section 702 may be conducted would not prevent
the Intelligence Community from gathering information related to the
conduct of foreign affairs, but rather would merely remove the highly
invasive practice of compelled company disclosure of communications
content absent judicial review as a means of doing so.
Curtailing the use of surveillance on US-based servers to
national security interests and increasing transparency
regarding surveillance is vital to restoring trust and US
credibility
Kehl, 14 – Policy Analyst at New America’s Open Technology Institute (Danielle,
“Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom &
Cybersecurity” July, https://www.newamerica.org/oti/surveillance-costs-the-nsasimpact-on-the-economy-internet-freedom-cybersecurity/
Section 215
and FISA Amendments Act Section 702 and conducted outside the U.S. under Executive Order 12333, have arguably had the
greatest and most immediate impact on America’s tech industry and global
standing. Strictly limiting the scope and purpose of surveillance under
these authorities—not just in regard to surveillance of Americans but of
non-Americans as well—will be critical to regaining the trust of individuals, companies and countries around the
The NSA mass surveillance programs described in the introduction, conducted domestically pursuant to USA PATRIOT Act
world, as well as stemming the economic and political costs of the NSA programs. The President’s NSA Review Group acknowledged the need for such
reform in its report on surveillance programs, affirming that “the right of privacy has been recognized as a basic human right that all nations should
unrestrained American surveillance of non-United States persons might
alienate other nations, fracture the unity of the Internet, and undermine
the free flow of information across national boundaries.”324 In addition to recommending a
variety new protections for U.S. persons, the Review Group urged in its Recommendation 13 that surveillance
of non-U.S. persons under Section 702 or “any other authority”—a reference intended to
respect,” and cautioned that “
should be strictly limited to the purpose of protecting
national security, should not be used for economic espionage, should not be
targeted based solely on a person’s political or religious views, and should
be subject to careful oversight and the highest degree of transparency
possible.326 Fully implementing this recommendation—and particularly restricting Section 702 and Executive Order 12333 surveillance to
include Executive Order 12333325 —
specific national security purposes rather than foreign intelligence collection generally—would indicate significant progress toward addressing the
concerns raised in the recent Report of the Office of the United Nations High Commissioner for Human Rights on “The Right to Privacy in the Digital
the common distinction between
“‘foreigners’ and ‘citizens’…within national security surveillance oversight
regimes” has resulted in “significantly weaker – or even non-existent –
privacy protection for foreigners and non-citizens, as compared with those
of citizens.”327 The leading legislative reform proposal in the U.S. Congress, the USA FREEDOM Act, would go a long way to protecting both
Age.” The UN report highlights how, despite the universality of human rights,
U.S. and non-U.S. persons against the bulk collection under Section 215 of records held by American telephone and Internet companies.328 On that
the
bill as originally introduced only added new protections for U.S. persons or for
wholly domestic communications,329 and even those protections were stripped out or weakened in the version of the
basis, passage of the law would very much help address the trust gap that the NSA programs have created. However, with regard to Section 702,
bill that was passed by the House of Representatives in May 2014.330 Meanwhile, neither the bill as introduced nor as passed by the House addresses
surveillance conducted extraterritorially under Executive or 12333. Therefore, even if USA FREEDOM is eventually approved by both the House and
much more will ultimately need to be done to
reassure foreign users of U.S.-based communications networks, services, and products that their rights are
being respected. Provide for increased transparency around government surveillance, both from the government and companies.
Increased transparency about how the NSA is using its authorities, and how
U.S. companies do—or do not—respond when the NSA demands their data is
critical to rebuilding the trust that has been lost in the wake of the Snowden disclosures. In July 2013, a coalition of large
the Senate and signed into law by the President,
Internet companies and advocacy groups provided a blueprint for the necessary transparency reforms, in a letter to the Obama Administration and
Congress calling for “greater transparency around national security-related requests by the US government to Internet, telephone, and web-based
service providers for information about their users and subscribers.”331 Major companies including Facebook, Google, and Microsoft—joined by
organizations such as the Center for Democracy and Technology, New America’s Open Technology Institute, and the American Civil Liberties Union—
demanded that the companies be allowed to publish aggregate numbers about the specific types of government requests they receive, the types of data
requested, and the number of people affected. They also also urged the government to issue its own transparency reports to provide greater clarity
about the scope of the NSA’s surveillance programs.332 “This information about how and how often the government is using these legal authorities is
important to the American people, who are entitled to have an informed public debate about the appropriateness of those authorities and their use, and
to international users of US-based service providers who are concerned about the privacy and security of their communications,” the letter stated.333
Two months later, many of the same companies and organizations issued another letter supporting surveillance transparency legislation proposed by
Senator Al Franken (D-MN) and Representative Zoe Lofgren (D-CA) that would have implemented many of the original letter’s recommendations.334
Elements of both bills, consistent with the coalition’s recommendations, were included in the original version of the USA FREEDOM Act introduced in
the House and the Senate—as were new strong transparency provisions requiring the FISA court to declassify key legal opinions to better educate the
public and policymakers about how it is interpreting and implementing the law. Such strong new transparency requirements are consistent with several
recommendations of the President’s Review Group335 and would help address concerns about lack of transparency raised by the UN High
all of these transparency provisions from the
original USA FREEDOM Act were substantially weakened in the version of
the bill that was passed by the House of Representatives in May 2014.337 Congress will need to
include stronger transparency provisions in any final version of the USA FREEDOM Act if it
intends to meaningfully restore trust in the U.S. Internet and
telecommunications industries and stem the loss of business that has begun
as a result of the NSA programs. As commentator Mieke Eoyang put it, “If reforms do not
deliver sufficient protections and transparency for [tech companies’]
customers, especially those abroad who have the least constitutional
protections, they will vote with their feet.”338 Recommit to the Internet Freedom agenda in a way that directly
addresses issues raised by NSA surveillance, including moving toward international human-rights based standards on surveillance. The United
States must act immediately to restore the credibility of the Internet Freedom
agenda, lest it become another casualty of the NSA’s surveillance programs.
Commissioner for Human Rights.336 Unfortunately,
agencies within the U.S. government have taken initial
steps to demonstrate goodwill in this area, particularly through the NTIA’s announcement that it intends to
As described in Part IV, various
transition stewardship of the IANA functions to a global multistakeholder organization and the State Department’s speech outlining six principles to
However, it will take a broader
effort from across the government to demonstrate that the United States is
fully committed to Internet Freedom, including firmly establishing the nature of its support for the evolving
guide signals intelligence collection grounded in international human rights norms.
multistakeholder system of Internet governance and directly engaging with issues raised by the NSA surveillance programs in international
Supporting international norms that increase confidence in the
security of online communications and respect for the rights of Internet
users all around the world is integral to restoring U.S. credibility in this
area. “We have surveillance programmes that abuse human rights and lack
in transparency and accountability precisely because we do not have
sufficiently robust, open, and inclusive debates around surveillance and national
conversations.
security policy,” writes Matthew Shears of the Center for Democracy & Technology.339 It is time to begin having those conversations on both a national
and an international level, particularly at key upcoming Internet governance convenings including the 2014 Internet Governance Forum, the
International Telecommunications Union’s plenipotentiary meeting, and the upcoming WSIS+10 review process.340 Certainly, the United States will
not be able to continue promoting the Internet Freedom agenda at these meetings without addressing its national security apparatus and the impact of
this presents an opportunity for
the U.S. to assume a leadership role in the promotion of better
international standards around surveillance practices.
NSA surveillance on individuals around the world. Rather than being a problem,
Scenarios
Activism
Middle East Activism
Internet Freedom within many countries in the Middle East set
up political activism to create a democratic world
Fontaine and Rogers, Fontaine is president of the Center for a New American
Security (CNAS) and worked on the National Security Council and Rogers worked
for the CNAS, 6/2011
(Richard and Will, “Internet Freedom: A Foreign Policy Imperative in the Digital Age”,
http://www.cnas.org/files/documents/publications/CNAS_InternetFreedom_FontaineRogers_
0.pdf , p. 14-19)//NC
III. Internet Freedom and Political Change The Internet’s potential as a tool for political change captivated top foreign policy
officials in 2009 during what was quickly dubbed Iran’s Twitter Revolution. The new
awareness grew as
protestors used the Internet and text messages to spread information and
coordinate efforts, and was crystallized by the viral movement of a video depicting the brutal slaying of a young
Iranian student, Neda Agha-Soltan. The video, which was captured on a mobile phone and uploaded to YouTube, traveled across the
Web and onto local and satellite television, prompting Obama to express his outrage at the killing. When the president of the United
States uses a White House press conference to address material uploaded to YouTube, something fundamental has changed in the
nature of modern communications. The
focus on Internet freedom grew as the Arab Spring
gathered momentum a year and a half later. The wave of revolts across the Arab world, beginning in
Tunisia, then sweeping across Egypt and into Libya, Bahrain, Yemen, Syria and
elsewhere were fueled in part by activists using tools such as Facebook, Twitter, SMS (text messaging) and other platforms.
Several regimes took draconian steps to stop online organizing and
communication. The sense grew that the Internet mattered, but just how it mattered was not totally clear. In a
sense, the Internet represents just the latest part of a story that has unfolded for centuries. Communication
technologies have played significant roles in political movements since antiquity, from the
printing press that empowered the Reformation, cassette tapes distributed by Iranian revolutionaries in 1979, to fax machines used
by Poland’s Solidarity movement and satellite television today. But the global nature of the Internet, its very low barrier to entry, its
speed and the degree to which it empowers the individual all make it qualitatively different from earlier technologies .
The
Internet itself has become the focus of attention by dictators, democracy activists and
observers around the world. Does Internet Freedom Lead to Democracy? The United States promotes
Internet freedom because Americans believe in the freedom of expression, in any medium.
The country also promotes it because American leaders have bet that, on balance, the
increased availability of new, unfettered communications technologies abets the spread
of democracy. But does it? Here we use the term “democracy” to mean a political system that is transparent and accountable
to the public through free and fair elections; includes active political participation by the citizenry; protects human rights; and
maintains a rule of law that is fair to all citizens.25 This is obviously an ideal, and democratic systems exhibit many variations, but
this definition offers a useful standard for measuring potential progress. Experts remain deeply divided, as shown in the text box on
the following page, as to whether unbridled access to the Internet can help transform authoritarian regimes over time and bring
greater freedom to once-closed societies. Most attempts to assess its impact rely on case studies, anecdotes or theory. The novelty of
the phenomenon and the few and widely varying data points pose notable analytical challenges, and assessments require a certain
amount of subjective interpretation. Facebook clearly played a major role in building an opposition to the Hosni Mubarak regime in
Egypt and in organizing protests. But after the government shut off the Internet, protests became bigger, not smaller. So did this
demonstrate the Internet’s limited role as a tool of agitation? Or did the shutoff of cherished online tools itself spur enraged citizens
to demonstrate instead of staying home (possibly in front of a computer)? It has become axiomatic to say that the Internet does not
itself create democracies or overthrow regimes; people do. This is obviously true, but if new communications tools do matter – and
there appears to be at least nascent evidence that they do – then they can play a role in several distinct ways. An important report
issued by the United States Institute of Peace (USIP) presented a useful framework for examining how new communications
technologies might affect political action. The paper identifies five distinct mechanisms through which the Internet might promote
(or be used by regimes to block) democratic progress.36 Here we deepen the analysis of these mechanisms and add two additional
factors that affect them. The
Internet may affect individuals, by altering or reinforcing
their political attitudes, making them more attuned to political events, and
enabling them to participate in politics to a greater degree than they could otherwise. This does not
automatically translate into a more activist population; as the USIP study notes, it could actually make citizens more passive by
diverting their attention away from offline political activism and toward less significant online activity.37 Some have called this
“slacktivism,” exemplified by the millions of individuals who signed online petitions to end genocide in Darfur but who took no
further action.38 At the same time, individuals freely expressing themselves on the Internet are exercising a basic democratic right.
As democracy scholar Larry Diamond points out, used in this way, the Internet can help “widen the public sphere, creating a more
pluralistic and autonomous arena of news, commentary and information.”39 It
can also serve as an instrument
through which individuals can push for transparency and government accountability,
both of which are hallmarks of mature democracies.40 New media might also affect
intergroup relations, by generating new connections among individuals, spreading
information and bringing together people and groups. (Some have worried about the opposite effect – the
tendency of the Internet to polarize individuals and groups around particular ideological tendencies.)41 This may occur not
only within countries, but also among them; the protests in Tunisia sparked a
clear rise in political consciousness and activism across the Arab world –
much of it facilitated by Internet-based communications and satellite television.42 It may
also take place over a long period of time; Clay Shirky, an expert at New York University, argues that a “densifying of the public
sphere” may need to occur before an uprising turns into a revolution.43 New communications
technologies
could also affect collective action, by helping change opinion and making it easier
for individuals and groups to organize protests in repressive countries.
Unconnected individuals dissatisfied with the prevailing politics may realize that others
share their views, which might form the basis for collective action.44 Relatively small groups,
elites or other motivated dissidents might use the Internet to communicate or organize
protests. Even if the number of committed online activists is small, they might nevertheless disseminate information to the
general population or inspire more widespread protests.45 Again, it is important to distinguish such action from group
“slacktivism;” as the successful protests in Egypt showed, the regime only began to teeter when thousands of citizens physically
occupied Tahrir Square. Though initial protests may have been organized via Facebook, the Mubarak government would still be in
power if the protests had been confined only to cyberspace. These
new technologies clearly affect regime
policies as well. Governments have employed a huge array of techniques aimed at
controlling the Internet and ensuring that their political opponents cannot use it freely.
This goes well beyond censorship, which garners the bulk of popular attention.
Autocracies also regularly monitor dissident communications; mobilize regime
defenders; spread propaganda and false information designed to disrupt protests and outside groups; infiltrate social
movements; and disable dissident websites, communications tools and databases. These and other practices can also induce selfcensorship and other forms of self-restraint by publishers, activists, online commentators and opposition politicians. Autocrats can
also turn dissidents’ use of the Internet against them. In Iran, for example, users of social media – which linked their accounts to
those of other protestors – inadvertently created a virtual catalogue of political opponents that enabled the government to identify
and persecute individuals. The regime established a website that published photos of protestors and used crowd sourcing to identify
the individuals’ names.46 Similarly, the Revolutionary Guard reportedly sent intimidating messages to those who posted proopposition messages and forced some citizens entering the country to open their Facebook accounts upon arrival.47 In the midst of
the Arab protests, Syria allowed its citizens to access Facebook and YouTube for the first time in three years. Some human rights
activists suspected that the government made the change precisely in order to monitor people and activities on these sites.48
Similarly, shortly after the Egyptian government lifted its Internet blackout in early 2011, pro-Mubarak supporters disrupted
planned demonstrations by posting messages on Facebook and Twitter saying that the protests had been canceled.49 The
government reportedly sent Facebook messages to citizens urging them not to attend protests because doing so would harm the
Egyptian economy.50 In the same vein, the Chinese government employs an estimated 250,000 “50 Cent Party” members who are
paid a small sum each time they post a pro-government message online.51 And after an anonymous post on the U.S.-based Chinese
language website Boxun.com called on activists to stage China’s own “Jasmine Revolution,” no demonstrators turned up at the rally
point – but it was flooded with security teams and plainclothes officers.52 Some speculated that Chinese officials themselves may
have authored the anonymous posting in an effort to draw out political dissidents.53 While no evidence has emerged to support the
claim, it is not hard to imagine such an attempt taking place in the future. Autocracies are engaged in “offline” attempts to repress
Internet use, as well. Saudi Arabia, for example, has not only blocked websites but also placed hidden cameras in Internet cafes
aimed at monitoring user behavior and required cafe owners to give their customer lists to government officials.54 China requires
users to register their identification upon entry to a cybercafe.55 And Libyan officials simply demanded that refugees fleeing the
recent fighting turn over their cellphones or SIM cards at border checkpoints.56 Beyond these effects, new
media can
affect external attention, by transmitting images and information to the outside world,
beyond the control of government-run media and regime censorship and spin. Such
attention can mobilize sympathy for protestors or hostility toward repressive regimes,57
as occurred when the video of Neda Agha-Soltan moved from YouTube to mainstream media. Digital videos and information may
also have a rebound effect; information transmitted out of Egypt and Libya by social networking and videohosting sites during the
protests in those countries made its way back in via widely watched satellite broadcasts. This
effect could be
particularly pronounced in countries like Yemen, where Internet penetration is low but
Al Jazeera is widely viewed. Similarly, print journalists have found sources and stories
through social media and have used the same media to push their articles out to the
world. In addition to the five mechanisms laid out by USIP and noted above, we observe two additional factors that affect them in
various ways. The economic impact of the Internet might affect the degree of
democratization in a country. The Internet has increased labor productivity and
corresponding economic growth, which may help middle classes emerge in developing
countries.58 Because new middle classes tend to agitate for democratic rights, new
technologies could indirectly promote democratization. In 2011, Clinton referenced a related dynamic,
the “dictator’s dilemma,” stating that autocrats “will have to choose between letting the walls fall or
paying the price to keep them standing … by resorting to greater oppression and
enduring the escalating opportunity cost of missing out on the ideas that have been
blocked and people who have been disappeared.”59 In other words, an autocrat can either repress the
Internet or enjoy its full economic benefits, but not both. Whether the “dictator’s dilemma” actually exists remains unknown. There
are certainly clear individual instances where Internet repression has damaged a nation’s economy; Experts from the Organisation
for Economic Co-operation and Development (OECD) have estimated that Egypt’s five-day Internet shutdown cost the country at
least 90 million dollars, a figure that does not include e-commerce, tourism or other businesses that rely on Internet connectivity.60
But China seems to provide a powerful counterexample since it severely represses the Internet while enjoying extraordinarily high
rates of sustained economic growth. Indeed, China appears to have used its restrictive Internet practices to squeeze out international
competition and generate conditions where only domestic companies – ones that adhere to the government’s stringent censorship
and monitoring practices – can thrive. China’s largest domestic search engine, Baidu, exercises strict controls on content but has
thrived since Google pulled out of China in January 2010. China may be an outlier; the massive financial and human resources it
devotes to online control may not be replicable elsewhere. Other countries may be left with blunter forms of repression that degrade
both the Internet’s economic and political effects. In addition to the political and economic effects described above, new technologies
can accelerate each of them. Google’s Eric Schmidt and Jared Cohen have argued that faster computer power combined with the
“many to many” geometry of social media empowers individuals and groups at the expense of governments and that this, in turn,
increases the rate of change.61 Dissidents can identify one another, share information, organize and connect with leaders and with
external actors, all easier and faster than ever before.62 Indeed, one hallmark of the 2011 Arab Spring was the astonishing rate of
change as popular protests threatened or toppled governments that had been in power for decades in a matter of weeks.63 Again,
the local political context is critical. The medium may be global, but whether and how it enables individuals to foster democratic
change largely depends on a wide array of local variables, including opposition leadership, the existence of civil society institutions,
the willingness of the regime to crack down on dissident activity, and so forth. In Tunisia and Egypt for example, tens of thousands
of protestors responded to protest event pages on Facebook by taking to the streets. Yet in other Arab states, a call on Facebook for a
“day of rage” did not have the same pronounced influence. The degree of openness in the local political system, the discontent
among the population, the willingness of the government to use coercive means to stop democratic activism, the role of minorities
and other local factors all matter greatly. The Internet does not automatically promote democratization; Iran’s Twitter revolution led
to no reforms while Egypt’s Facebook revolution toppled the Mubarak regime. Furthermore, the technology itself is agnostic; the
same online tools that empower dissidents can aid dictators in their oppression. In the short run, at least, a freer
Internet
does not automatically translate into more liberal political systems. Yet some case
studies do demonstrate the Internet’s profound potential: that access to an
open Internet can help countries slide away from authoritarianism and
toward democracy. Events in Iran, Tunisia, Egypt and elsewhere suggest that the Internet and related technologies
(such as SMS) have indeed served as critical tools for organizing protests, spreading information among dissident parties and
transmitting images and information to the outside world – some of which moved onto satellite television channels, further boosting
their influence.64 And while experts
continue to argue about the precise effect, they tend to agree
that social media tools have made revolutions in the Middle East easier and speedier
than they would have otherwise been.65 Perhaps the most compelling link between a free
Internet and democratization is also the simplest: Both dissidents and dictatorships
abroad seem to believe that the Internet can have a transformative role, and they act on
that basis. Dictatorships expend enormous time and resources to clamp down on online activity, and more than 40 countries
actively censor the Internet or engage in other forms of significant Internet repression.66 Meanwhile, millions of individuals use
proxy servers and other circumvention and anonymity tools to evade censorship and monitoring. During the 2009 presidential
campaign in Iran, for example, both President Mahmoud Ahmadinejad and his opponent, Mir-Hussein Mousavi, cited the Internet
as a tool through which the liberal opposition could mobilize support.67 It is unlikely they were both wrong. While the effect of the
Internet will depend on local conditions, there are indeed reasonable grounds for believing that a free Internet can help empower
individuals to press for more liberal political systems.
Authoritarian rule in Arab societies oppress their people
Ghalioun, a professor of sociology at the Université de Paris III Sorbonne
University in Paris, 2004
(Burhan, The Persistence of Arab Authoritarianism, Journal of Democracy 15.4 (2004) 126-132)//NC
I should begin by saluting Alfred Stepan for steering clear (in his July 2003 essay in these pages) of the notion, widely broadcast in the Western media,
that Islam and Arab culture are incompatible with democracy. Having said that, I wish to make three remarks. The first is that "quantitative" analyses
founded on hard-to-evaluate concepts such as "competitive elections" do not seem pertinent to me, all the more so since the
authoritarianism of Arab regimes is a commonplace of numerous academic studies going back
more than twenty years. My second remark is that the notion of competitive elections reveals little of the cruel realities of the
oppression to which Arab societies have been subjected over the last three decades. In such
societies, the question of power relations cannot be broached in the absence of free elections. Beyond the issue of dictatorship
there is the complex problem of the almost complete rupture between
governments that answer to no one—political predators unrestrained by law or
morality—and those whom they govern, who find themselves reduced to a
state of cruel marginalization and indeed slavery. These oppressed citizenries
are denied the rights to express their opinions, to organize themselves
freely in civic associations, and to take part in the making of decisions that
affect their lives and futures. The sorts of regimes that today predominate in the Arab world have nothing in common with
the populist or nationalist regimes that inaugurated the postindependence era. Despite their authoritarian character, those populist regimes achieved
grand transformations upon the path of democratization and modernization. By eliminating the remnants of feudalism and aristocratic parasitism, by
distributing land to peasants, by founding national state structures and administrative services, and by pushing economic modernization, they
succeeded in gaining the trust and support of large sectors of the population, which saw in such regimes the stuff of emancipation and liberation. Their
newer
regimes enjoy no popular support. They serve only the interests of the clans who hold power, they
communicate in no way whatsoever with their citizenries, and they depend for their
survival solely upon coercion and multiple security services. These regimes go beyond
dictatorship; they put the state in the service of elites corrupted against the nation. Such an organization of power
presupposes and demands the dis-organization—which is to say the oppression—of
society. It is readily apparent that the problem here goes far beyond the absence of free elections. My third remark is that the question of despotic
authoritarianism was almost hidden by their popularity. This is not the case with the regimes that have replaced them. These
power is inseparable from the whole syndrome of sociopolitical ills that afflicts the Arab lands. The democratic deficit that troubles the bulk of these
countries is accompanied by a host of problems in other domains—economic, social, administrative, military, cultural, and educational. earing this in
mind, we must take into view the whole of the system. Perhaps what we are seeing are aspects of that system's crisis or indeed failure. Despotism
appears to be both a consequence of failure and the response favored by rulers faced with the resulting crisis—marked by weak or nonexistent economic
. The culture of
the elites cannot by itself explain the creation or evolution of these sociopolitical
systems, and still less can it explain the crisis that is their consequence and complement.
The failure of these systems—whether in their patriarchal, monarchist version as in
Saudi Arabia or their fascist, republican version as in the Ba'athist states—is the result of
the stagnation of power, meaning the lack of any turnover or renewal of elites. Shielded
from any contestation or even contestability, the existing powerholders of the Arab
world have turned into a kind of hereditary aristocracy. They act as if they are the
growth, the degradation of the political and social climate, the decline of educational systems, and moral and ideological ruin
legitimate proprietors of whole states, whose resources and even populations the rulers
may use according to their whims. This feudalization of modern states has come to such a pass that presidents and other high
officials...
America should embrace Internet Freedom, which will allow
them to help democratic parties to overtake authoritarian rule
Fontaine and Rogers, Fontaine is president of the Center for a New American
Security (CNAS) and worked on the National Security Council and Rogers worked
for the CNAS, 6/2011
(Richard and Will, “Internet Freedom: A Foreign Policy Imperative in the Digital Age”,
http://www.cnas.org/files/documents/publications/CNAS_InternetFreedom_FontaineRogers_
0.pdf , p. 5-7)//NC
America needs a comprehensive Internet freedom strategy, one that tilts the
balance in favor of those who would use the Internet to advance tolerance
and free expression, and away from those who would employ it for
repression or violence. This requires incorporating Internet freedom as an integral
element of American foreign policy. As recent events in the Middle East demonstrate, the Internet has emerged as
a major force in international affairs, one that will have lasting implications for the United States and the international community.
But new communications technologies are a double-edged sword. They
represent both a medium for
individuals to communicate, form groups and freely broadcast their ideas around the
world, and a tool that empowers authoritarian governments. U.S. policymakers should
better appreciate the complex role new communications technologies play in political
change abroad, and how those technologies intersect with the array of American foreign
policy objectives. Internet freedom typically includes two dimensions. Freedom of the
Internet denotes the freedoms of online expression, assembly and
association – the extension to cyberspace of rights that have been widely recognized to exist outside it. Promoting
freedom of the Internet merely expands to cyberspace a tradition of U.S.
diplomatic and financial support for human rights abroad. Freedom via the
Internet, the notion that new communications technologies aid the establishment of
democracy and liberal society offline, is at once more alluring and hotly contested. Internet freedom in this sense
has captured the imagination of many policymakers and experts who see in these technologies a tool for
individuals to help move their societies away from authoritarianism and
toward democracy. Though the links between democracy and Internet freedom are indirect and complex, nascent
evidence suggests that new communications tools do matter in political change, and that both dissidents and dictators act on that
basis. Most attention has focused on technologies that allow dissidents to penetrate restrictive firewalls and communicate securely.
But funding technology comprises just one aspect of America’s Internet freedom agenda. The
United States also
advocates international norms regarding freedom of speech and online
assembly and opposes attempts by autocratic governments to restrict
legitimate online activity. The private sector has a critical role to play in promoting Internet freedom, but, given
corporate interests in maximizing profits rather than promoting online freedom in repressive environments, efforts to expand its
role are difficult. Ethical debates, ranging from whether American companies should be permitted to sell repressive regimes key
technologies to the responsibilities of corporations in the face of an autocracies’ demand for information, remain unresolved. And
the other side of this coin – whether U.S. export controls should prohibit selling technologies that could be used to promote online
freedom – is often overlooked. To date, the U.S. government has shied away from articulating fully the motivations behind its
Internet freedom agenda. Administration
officials emphasize that their policy supports freedom
of the Internet, not freedom via the Internet, and that the Internet freedom agenda is
not part of a broader strategy to support democratic evolution. It should be. Admittedly,
promoting Internet freedom is complicated, and involves inherent tensions with other
U.S. foreign policy, economic and national security interests. This is particularly true in the area of
cyber security. Cyber security experts seek to secure the United States against cyber attacks,
for example, by pushing for greater online transparency and attribution, while Internet
freedom proponents urge greater online anonymity. While tensions between Internet freedom and cyber
security are real, and in some cases will force difficult choices, they should not prevent robust U.S. efforts to advance both. A robust
Internet freedom agenda should reflect the following eight principles: Principle 1: Embrace a Comprehensive Approach U.S.
policymakers should incorporate Internet freedom into their decision-making (especially on
cyber security and economic diplomacy issues); convene private sector professionals, export controls experts,
diplomats and others to explore new ways of promoting Internet freedom; and use
traditional diplomacy to promote Internet freedom. Principle 2: Build an International Coalition to
Promote Internet Freedom The U.S. government should convene a core group of democratic
governments to advocate Internet freedom in key international fora; urge governments to
encourage foreign companies to join the Global Network Initiative (GNI); and ensure that the Secretary of State gives her next major
address on Internet freedom in a foreign country, possibly in Europe alongside key European Union (EU) commissioners. Principle
3: Move Beyond Circumvention Technologies The
U.S. government should continue to fund
technologies other than firewall-evasion tools, including those that help dissidents
maintain digital security, ensure mobile access and reconstitute websites after a cyber
attack. The U.S. government should offer financial awards to foster technological innovation, require that any online tool
receiving U.S. funding be subjected to an independent security audit and expand the sources of technology funding to include
foreign governments, foundations and the private sector. Principle 4: Prioritize Training The State Department, along with the U.S.
Agency for International Development (USAID), should continue to foster Internet freedom through targeted training programs,
including education on online safety. Principle 5: Lead the Effort to Build International Norms The
U.S. government
should promote a liberal concept of Internet freedom in all relevant fora, and reject
attempts by authoritarian states to promote norms that restrict freedoms of
information and expression online. It should also pursue an international
transparency initiative to encourage governments to publicize their policies on
restricting online information. Principle 6: Create Economic Incentives to Support Internet Freedom U.S. officials
should continue to articulate the economic case for Internet freedom, backed wherever possible by solid quantitative evidence, and
push for Internet censorship to be recognized as a trade barrier. Principle 7: Strengthen the Private Sector’s Role in Supporting
Internet Freedom Congress should adopt laws that prohibit American corporations from giving autocratic governments the private
data of dissidents when the request is clearly intended to quash legitimate freedom of expression, and that require companies to
periodically disclose requests it receives for such data to the U.S. government. U.S. officials should continue to urge companies to
join the GNI, but also encourage them to develop broad unilateral codes of conduct consistent with the GNI. They should also
publicly highlight specific business practices, both positive and negative. Principle 8: Reform Export Controls The
U.S.
government should relax controls on technologies that would permit greater online
freedom while protecting American national security, and educate companies on the precise nature of
export control restrictions so that companies do not overcomply and deny legal technologies to dissidents abroad. In addition, we
offer several recommendations for technology companies, including providing dissidents basic technical assistance to better use
built-in security functions for software and hardware; better informing users and the public about who may access the data they
control and under what conditions; increasing corporate transparency about foreign government requests; and
for increased Internet freedom.
advocating
XTN
O/V: Currently in the status quo the United States has an Internet Freedom agenda in
which they vouch for a free internet across the world, however, currently US
surveillance programs, such as Prism, are creating a bad perception throughout other
countries throughout the world. This perception is leading to an increase in data
localization, where other countries are attempting to isolate themselves and block any
outside connections to their internal network. Currently there is a global internet that
allows middle eastern activists to communicate with activists around the world and
spread their messages across their country to spark reform. If data is localized, it means
that authoritarian regimes will begin to crack down more on political movements within
countries in the Middle East and be able to completely eliminate these efforts. These
authoritarian regimes dehumanize the people within them and do not allow them to
have access to their basic human rights. Only by embracing Internet Freedom and
curtailing domestic surveillance can we begin to move towards more data globalization
to allow these movements to continue and grow
China Activism
Despite authoritarian restrictions, China still has the ability to
utilize Internet Freedom that allows them to create political
activism and anti-regime protests
Tang and Huhe, Both work at the Shanghai University of Finance and Economics,
2013
(Min and Narisong, Alternative framing: The effect of the Internet on political support
in authoritarian China, International Political Science Review 0(0) , Pg. 1-6)//NC
The recent democratic movements in the Middle East and North Africa have re-energised the longstanding debate over the
democratic potential of the Internet in an authoritarian environment (Farrell, 2012; Howard and Muzammil, 2011; Lynch, 2011;
Tufekci and Wilson, 2012). The evident role of the Internet and its associated social media in the protests of the Arab Spring has
strengthened the belief that digital media can help bring down the remaining authoritarian regimes. However, later developments in
countries such as China, Singapore, Cuba and Iran suggest that the Internet is still effectively controlled by authoritarian
governments and is unable to facilitate any significant political upheavals. Many authoritarian regimes even reacted to the Arab
Spring by fine-tuning and reinforcing their censorship programmes. This contradictory picture of the role of the Internet raises
questions about the Internet’s independent role in authoritarian countries. Is the Internet merely a tool that can benefit both
ordinary citizens and authoritarian states? What is the effect of the Internet in places where there are no Internet-facilitated political
protests? We address these questions by turning attention
to the micro-process through which the daily
use of the Internet changes individuals’ view towards the authoritarian state. In particular, we
argue that ‘alternative framing’, facilitated by the diffusion of the Internet, can strongly affect popular support for an authoritarian
regime. Framing refers to a process of selecting ‘some aspects of a perceived reality and mak[ing] them more salient in a
communicating text’ (Entman, 1993: 52). Compared with framing of the traditional media, a distinctive feature of Internet framing
is the active role of web users in framing news events. Through online comments, blog posts, forum discussions and other
interactive features
of the Internet, dissident opinion leaders and, more often, ordinary web
users have gained venues to express their views on news events and issues. The interpretations
and perspectives expressed by web users often construct social realities in directions that are different from or even opposite to the
ones propagandised by the authoritarian state. This
democratic nature of Internet framing
entails particularly important implications in authoritarian countries such
as China, where overt news reporting is strictly monitored and media framing has traditionally been dominated by the state.
To examine empirically the effect of alternative framing, we conducted a laboratory experiment in a major Chinese university. The
news of China’s recent space programme was chosen to present different frames. While the government framed the space
programme as the manifestation of the nation’s technological advancement and the righteousness of the party’s leadership, a
significant portion of the Internet discussion framed the event as a ‘performance project’ aimed at boosting the regime’s legitimacy
and, more importantly, a misuse of resources that could otherwise have been used to improve the well-being of ordinary citizens.
The experimental results show that exposure to the alternative framing embodied in Internet discussions significantly reduces the
level of participants’ support for the space programme policy and their evaluation of government performance in improving citizens’
well-being. The contribution of this study is twofold. First, it constitutes one of the first attempts to theoretically specify and
empirically test the mechanism through which the Internet influences political attitudes in an authoritarian environment. It offers
empirical support for the independent role of the Internet and suggests that the Internet
is not merely a tool for political activists to organise collective actions or for the state to
consolidate authoritarian rule but, rather, an independent causal factor that generates the makeover of the public’s mindset. Second,
this study bridges the study of the Internet with framing studies in the traditional media. On the one hand, it builds on an
established paradigm of traditional media research to understand the Internet effect. On the other hand, it adds a new dimension to
traditional issue framing by emphasising that the online framing process has been strongly shaped by the emergence of large
numbers of active web users. Literature review: The Internet effect in authoritarian countries The conventional optimism about the
effect of the Internet in authoritarian countries is built mainly upon three tenets (Diamond, 2010; Howard, 2010; Shirky, 2011;
Zheng and Wu, 2005). First, it is believed that the expanded
access to alternative information
offered by the Internet challenges the information control of authoritarian
regimes. The corruption of power, brutality and social injustice can easily
be exposed on the Internet due to its anonymity, fast speed and low cost of
communication (Best and Wade, 2009: 256; Diamond, 2010: 76). Second, digital information
technology is praised for facilitating anti-regime political movements (Chase and
Mulvenon, 2002; Lynch, 2011: 304–306; Shirky, 2009). It has been documented that political activists have
used the Internet to disseminate information, mobilise forces for change
and organise actions in a number of protests (Chowdhury, 2008; Diamond, 2010: 79; McFaul,
2005; Rheingold, 2002), which was notably manifested in the Arab Spring (Lotan et al., 2011). Finally, the Internet can foster the
development of civil society by pluralising the flow of information, widening and intensifying public deliberation, promoting
alternative channels of social interaction, and facilitating networking among activists (Diamond, 2010: 71–72; Hill and Sen, 2000;
Lynch, 2011: 306–307; Mercer, 2004; Murphy, 2009; Yang, G, 2003). Many other scholars, however, question such utopian views of
the Internet. Their scepticism stems mainly from the success of governmental control over the Internet. Through sophisticated
regulation and censorship, the people of China, along with those of Vietnam, Cuba, Iran and Singapore, have not received the benefit
of the democratising effects of the Internet (Boas, 2006; Harwit and Clark, 2001; Kalathil and Boas, 2001, 2003; Rodan, 1998;
Taubman, 1998). By employing technological and institutional means, these authoritarian regimes have managed to use the growth
of the Internet to help economic development, technology innovation and globalisation and, at the same time, to reduce its harmful
political effects (Bueno de Mesquita and Downs, 2005; Morozov, 2011). Researchers have argued that, particularly in China, by
controlling the technological infrastructure, co-opting private Internet companies, documenting the ‘real-name’ access and
developing sophisticated censorship systems, the regime has imposed a close grip on cyberspace and has successfully transformed
itself into a ‘networked authoritarianism’ (Hachigian, 2001; Harwit and Clark, 2001; Hassid, 2008; Hung, 2010). The current debate
over the potential of the Internet in authoritarian countries focuses primarily on the ‘revolutionary’ role of the Internet in
contentious politics and, specifically, its contribution to protests, large-scale upheavals and dramatic cases of regime change (Lynch,
2011: 307; Shirky, 2011: 30). It must be borne in mind, however, that the Internet produces ‘change over years and decades, not
weeks or months’ (Shirky, 2011: 30) by eroding the ability of states to monopolise information and arguments and by exacerbating
people’s ‘dissatisfaction with matters of economics or day-to-day governance’ of the state (Lynch, 2011: 5). Inadequate scholarly
effort, unfortunately, has been spent on theoretically explaining or empirically testing how daily consumption of the Internet can
influence one’s views towards the authoritarian regime in an environment in which digital information is severely filtered and
censored. As pointed out by Farrell (2012: 38), the question of whether the Internet contributes to democracy is unanswerable
because it ‘proposes no specific theory as to the connection’ between the Internet and a political outcome. In fact, the number of
quantitative studies on this topic is very limited. This study explores the causal mechanism of the Internet’s effect on attitudinal
change at the individual level by using China as a critical case. Such an empirical test of the micro-process of the Internet effect can
help disentangle the causal effects of the Internet and provide empirical support for arguments in regard to the political contribution
of the Internet. Specifically, this study argues that even
if there is tight state control over the
access to deviant information, exposure to online discussions of sanctioned
information can still undermine people’s support of the government, and one of
the key mechanisms of this undermining effect is user-generated alternative framing. Issue framing and the Internet Issue framing
has been regarded as an important mechanism through which the traditional media affects public attitudes. Frames refer to the
modes of presentation and interpretation that construct social realities. Media framing works by either presenting logically
equivalent content differently, casting it in a negative or positive light, or selecting some parts of a news item and making them
salient, while ignoring or downplaying other parts (Lecheler and De Vreese, 2011: 961). Media framing involves ‘problem definition,
causal interpretation, moral evaluation, and/or treatment recommendation’ (Entman, 1993: 52). Framing is critical to shaping
people’s political attitudes because it helps individuals make sense of an otherwise meaningless succession of events (Goffman, 1974;
Iyengar, 1991; Kinder and Sanders, 1990; Lecheler and De Vreese, 2011; Nelson et al., 1997; Slothuus, 2008). The news information
on the Internet also contains frames, and some media researchers have examined the framing effect of the Internet (Coleman and
Hall, 2001; Kopacz, 2008; Song, 2007; Xenos and Foot, 2005; Zhou and Moy, 2007; Zillmann et al., 2004). Zillmann et al. (2004),
for instance, argue that compared with traditional media users, Internet magazine viewers have greater freedom to select articles to
read and thus demonstrate a stronger selective-exposure effect of news frames. Kopacz (2008) notes that the Internet provides
candidates with unparalleled opportunities to discuss their issue stances and enables them to escape the traditional filtering by news
reporters and pundits in the conventional media. However, an important aspect of Internet framing – the active role of Internet
users in framing news events – has not received adequate attention. What makes the Internet distinctive is the change in the relative
position of journalists and the audience in constructing news, including frame building. In the traditional media, the role of media
users is very limited due to the prohibitive costs of message delivery and the restrictions imposed by government regulations.
Accordingly, frame researchers have focused mainly on the influence of internal factors, such as journalists’ political orientation,
professional values and organisational constraints (Zhou and Moy, 2007: 81). The rise of the Internet has tremendously increased
the opportunities and the capacities of the public to participate in frame building. Compared with the traditional media, web-based
communication is decentralised. Web users can actively contribute to both information dissemination and issue framing. Through
blogging, commenting, discussing and other means, almost any individual or organisation that has Internet access can discuss
political or policy issues, publicise their thoughts, and promote their ideas, and thus contribute to the framing of news events and
issues. The one-way asymmetric model of traditional communication has been changed to a dialogical type of journalism, through
which news production becomes a collective endeavour (Benkler, 2006; Lowrey and Anderson, 2005; Mitchelstein and Boczkowski,
2009: 573). The meanings and values developed through online discourse and attached to news events by web users are alternatives
to those presented by journalists, politicians and organisations. Internet
framing in China
Accompanied by rapid market reform, the mass media in China have experienced a great deal of change
in recent decades. In terms of the structure of the market, the official media are no longer the only information source.
Commercialisation has led to the growth of a number of media outlets that
are not bankrolled by the government (Tang and Iyengar, 2011; Thomas and Nain, 2005). In terms of
news content, stories about the negative side of society, like corruption, poverty
and violation of norms, and political uprisings in other authoritarian countries have often come to
be seen in TV programmes and newspapers (Hassid, 2008; Shirk, 2010; Stockmann, 2011). However, although the
commercialisation of the traditional media contributes to offering alternative information for the public, it has not yet transformed
the overall pro-regime effect of the media in China. In fact, recent studies of the media effect have consistently revealed that media
consumption is significantly associated with higher levels of political support for the system and its political institutions (Kennedy,
2009; Stockmann and Gallagher, 2011; Tang, 2005; Yang and Tang, 2010). This is largely due to the fact that the official media can
still be effectively controlled by the state. As scholars of the Chinese media have observed, even when some commercial media
outlets do dare to challenge the official directions on major issues, the state is able to quickly step in and steer the deviant reporting
back to the official line (Stockmann, 2011). Compared with the tools of the traditional media, the Internet proves far more difficult to
control given the sheer number of users and their activities on the web. In particular, in this study, we stress that the interactive
features of the Internet enable users to participate in news making by framing social political issues as they prefer. This userparticipated framing entails especially important implications in China, where, among the traditional media, competing frames of
news events were limited or non-existent before the rise of the Internet. First, user-generated frames on the Internet constitute the
most viable, if not the only, alternatives to the official frames provided by the state propaganda machinery. Under the traditional
media environment in China, the authoritarian regime monopolised not only the supply of news information, but also the framing of
information. The regime has attempted to control the interpretation of important events and sensitive issues through reinforcing the
journalists’ mouthpiece role in frame building and/or directly interrupting the deviant framing processes of media coverage (Zhou
and Moy, 2007: 84). As a result, news frames used by Chinese journalists have largely been consistent with the official line (Chang et
al., 1998; Luther and Zhou, 2005; Pan et al., 1999; Yang, J, 2003). The
rise of the Internet enables
ordinary citizens to act as the agents of framing in news making for the first
time in China. With all the interactive features of the Internet, active web users have gained the
most effective platforms to publicise their own understandings of the nature of events
and issues, interpretations of the cause or the consequences of social happenings, evaluations of institutions or politicians, and the
solutions they prefer. At the very least, this means that in the new media environment in China, not only news facts, but also news
frames, no longer have to come from journalists or their political overlords. Ordinary web viewers, on an unprecedentedly large
scale, are exposed to those interpretations and views that are not fabricated by propaganda agencies of the state. Second, the
alternative frames that emerge from online discourse are often different from or opposite to the intention of the authoritarian state.
This is due to the lack of ways to express alternatives through formal institutional approaches or through traditional media outlets.
Overall, in
China’s cyberspace, the tone of discussion forums tends to be negative and even cynical; the
content of discussion often quickly moves from specific news events to
general problems in the political, economic and legal systems (Herold and Marolt,
2011; Sullivan, 2012; Tang and Yang, 2011; Yang, 2009; Zhou, 2009). Either promoted by online activists or
generated through spontaneous and grassroots deliberation, a few counterofficial frames can be identified in online discourse in contemporary China. For
instance, while the official media report a crime that involves officials as a judicial case, netizens tend to frame it as a case about the
abuse of power and social injustice. While the state media characterise the corruption of government officials as an isolated case and
attribute it to a lack of oversight and self-discipline, dissenting individuals on the web associate it with the undemocratic nature of a
political system that lacks checks and balances. Third, the
importance of such alternative framing on the
Internet is further augmented by the fact that the access to alternative information
sources is limited by the control of the Chinese state and the self-censorship of websites.
As widely noted, the Internet in China is severely censored (Boas, 2006; Kalathil and Boas, 2003; Rodan, 1998; Taubman, 1998).
However, the
focus of state control is on limiting the chance of citizens to have access to the
news facts, especially those deemed harmful for regime stability, not on limiting the
interpretations of seemingly safe facts. The government’s ban on online discussions has
targeted mostly sensitive topics, such as the Tiananmen Square protest, Jasmine
Revolution and power struggles of top leaders. A recent comprehensive survey of social media websites in
China conducted by King et al. (2012) confirms this pattern and shows that negative, even vitriolic,
criticism of the state, political elites and public policies is allowed on the web as long as
it has no potential for collective action (Sullivan, 2012; Tang and Yang, 2011; Yang, 2009). Online discussion of
sanctioned issues or seemingly safe topics, however, can go as rogue as do subversive news facts. A case in point is the heated online
discussion triggered by the death of Steve Jobs, the former Chief Executive Officer of Apple Inc. One line of discussion asks why
China does not have an innovator like Steve Jobs. A general theme that emerged from this discussion is that although China is not
short of intelligent minds, there are too many restrictions and interventions, many of which are politically relevant, for these minds
to emerge as a force. The government is blamed for its part in providing education that does not value critical thinking,
monopolising economic resources into the hands of a few with connections and failing to protect property rights and encourage
innovation. A widely shared blog post states, ‘If Apple is a fruit in a tree, its branches are the freedom of thinking and to create, and
the root is the constitutional democracy.’ Such examples are abundant in China’s cyberspace. Due to alternative framing enabled by
the Internet, in a country where politics is supposed to be a taboo, everything can become politically relevant. As long as websites
allow features such as the ability to post comments or to blog, active web users have an opportunity to voice their dissident views,
and ordinary web viewers have an opportunity to come across these alternative views. While Chinese rulers may have been
successful in reducing the amount of subversive news facts on the web, they are still exposed to the challenges posed by the
alternative framing of Internet information.
China is violating human rights in the Squo
Human Rights Watch 2014 (World Report: China, Human Rights Watch,
http://www.hrw.org/world-report/2014/country-chapters/china)//NC
The government censors the press, the Internet, print publications, and
academic research, and justifies human rights abuses as necessary to
preserve “social stability.” It carries out involuntary population relocation
and rehousing on a massive scale, and enforces highly repressive policies in
ethnic minority areas in Tibet, Xinjiang, and Inner Mongolia. Though primary
school enrollment and basic literacy rates are high, China’s education system
discriminates against children and young people with disabilities. The
government obstructs domestic and international scrutiny of its human rights record,
insisting it is an attempt to destabilize the country. At the same time, citizens are
increasingly prepared to challenge authorities over volatile livelihood issues, such as
land seizures, forced evictions, environmental degradation, miscarriages of justice,
abuse of power by corrupt cadres, discrimination, and economic inequality. Official
and scholarly statistics, based on law enforcement reports, suggest there are
300-500 protests each day, with anywhere from ten to tens of thousands of
participants. Despite the risks, Internet users and reform-oriented media are
aggressively pushing censorship boundaries by advocating for the rule of law and
transparency, exposing official wrongdoing, and calling for political reforms. Civil
society groups and advocates continue to slowly expand their work despite their
precarious status, and an informal but resilient network of activists monitors and
documents human rights cases as a loose national “weiquan” (rights defense)
movement. These activists endure police monitoring, detention, arrest,
enforced disappearance, and torture. The Xi Jinping administration formally
assumed power in March, and proposed several reforms to longstanding policies,
including abolishing one form of arbitrary detention, known as re-education through
labor (RTL), and changes to the household registration system. It staged high-profile
corruption investigations, mostly targeting political rivals. But it also struck a
conservative tone, opposing constitutional rule, press freedom, and “western-style” rule
of law, and issuing harsher restrictions on dissent, including through two legal
documents making it easier to bring criminal charges against activists and Internet
critics. Bo Xilai, once a rising political star, was sentenced to life imprisonment in
September after a show trial that captured public attention but fell short of fair trial
standards and failed to address widespread abuses of power committed during his
tenure in Chongqing. Human Rights Defenders China’s human rights activists
often face imprisonment, detention, torture, commitment to psychiatric
facilities, house arrest, and intimidation. One of the most severe
crackdowns on these individuals in recent years occurred in 2013, with more
than 50 activists put under criminal detention between February and October.
Human rights defenders are detained for ill-defined crimes ranging from
“creating disturbances” to “inciting subversion” for organizing and
participating in public, collective actions. In July, authorities detained Xu
Zhiyong, who is considered an intellectual leader of the New Citizens Movement, a loose
network of civil rights activists whose efforts include a nationwide campaign that calls
on public officials to disclose their assets. In September, Beijing-based activist Cao
Shunli was detained after she was barred from boarding a flight to Geneva
ahead of the United Nations Human Rights Council (HRC) review of China
on October 22. Cao is known for pressing the Chinese government to include
independent civil society input into the drafting of China’s report to the HRC under a
mechanism called Universal Periodic Review (UPR). Another activist, Peng Lanlan, was
released in August after she spent one year in prison for “obstructing official business”
for her role in the campaign. Nobel Peace Prize winner Liu Xiaobo continues his 11-year
jail term in northern Liaoning province. His wife Liu Xia continues to be subjected to
unlawful house arrest. In August, Liu Xiaobo’s brother-in-law, Liu Hui, was given an 11year sentence on fraud charges; it is widely believed the heavy sentence is part of
broader effort to punish Liu Xiaobo’s family. Legal ReformsWhile the government
rejects judicial independence and prohibits independent bar associations, progressive
lawyers and legal scholars continue to be a force for change, contributing to increasing
popular legal awareness and activism. The Chinese Communist Party maintains
authority over all judicial institutions and coordinates the judiciary’s work through its
political and legal committees. The Public Security Bureau, or police, remains the most
powerful actor in the criminal justice system. Use of torture to extract confessions
is prevalent, and miscarriages of justice are frequent due to weak courts
and tight limits on the rights of the defense. In November, the government
announced its intention to abolish re-education through labor (RTL), a form of arbitrary
detention in which the police can detain people for up to four years without trial. There
were about 160,000 people in about 350 camps at the beginning of the year, but
numbers dwindled rapidly as the police stopped sending people to RTL. The official
press, however, reported that some of these facilities were being converted to drug
rehabilitation centers, another form of administrative detention. At time of writing it
was unclear whether the government would fully abolish administrative detention as a
way to deal with minor offenders, or whether it would instead establish a replacement
system that continued to allow detention without trial. China continues to lead the
world in executions. The exact number remains a state secret, but experts estimate it has
decreased progressively from about 10,000 per year a decade ago to less than 4,000 in
recent years.
XTN
China continues to oppress civilian rights
Shu, is a former columnist for the Chinese newspaper Southern Weekly and
the Chinese magazine Yanhuang Chunqiu, 13
(Xiao, China's veil of Civil Rights oppression,
http://www.nytimes.com/2013/11/27/opinion/chinas-veil-of-civil-rightsoppression.html?_r=0)//NC
TAIPEI, TAIWAN The Third Plenum, a gathering of Chinese Communist Party leaders
to set economic policy, ended this month with a raft of economic and social reforms that
were praised by Western observers: giving the market a greater hand in setting prices,
relaxing the one-child policy, strengthening land rights and shoring up the social safety
net. But as far as I’m concerned, the party’s itinerary and timeline for so called
reform are no cause for optimism, because China’s leaders did very little to
bolster rule of law and the rights of ordinary citizens. To the contrary, the
economic reforms may serve as a convenient distraction from the appalling crackdown
on three advocates of civil rights — the legal reformers Xu Zhiyong and Guo Feixiong
and the entrepreneur Wang Gongquan, all participants in the New Citizens’ Movement,
a campaign for civil and human rights — who have been detained since the summer.
Criminal investigations against them are proceeding, and all three men are likely to
receive heavy sentences. Mr. Xu, whose activism helped bring an end to the abusive and
arbitrary detentions of urban migrants without residency permits in 2003, and Mr. Guo,
who helped villagers in Guangdong Province organize a recall election against a corrupt
village chief in 2005, helped initiate this movement. Mr. Wang, who made a fortune in
real estate and technology, financed and supported the movement. The arrests of the
three men, an obvious attempt to decapitate the movement, was preceded by
the arrest of more than 20 rank-and-file members. Unlike the usual silence greeting the
arrest of dissidents, this crackdown has caused many prominent establishment figures
to step forward in protest, and even the risk-averse state media have followed the story
closely. The government’s ruthlessness sent a signal that the authorities will
not tolerate public pressure or any form of opposition — even as moderate and
law-abiding as that of the New Citizens’ Movement. The movement does not aspire to
political power and does not advocate hostile confrontation. It holds that reform is a
multifaceted and gradual process that involves the transformation of society, the
development of autonomous nongovernmental organizations, and the protection of
basic human and civil rights. The movement’s efforts began in 2010 with the signing of a
citizens’ pledge of collective action. It successfully petitioned educational authorities to
allow the children of rural migrants to take the national college entrance exam for
university seats. Last year, the group campaigned for disclosure of government officials’
assets, and promoted dinner gatherings across a dozen cities to discuss civic affairs.
Earlier this year, the movement collected signatures for an appeal to the National
People’s Congress to ratify international human rights conventions. The New Citizens’
Movement operates entirely within the bounds of China’s Constitution and laws, and the
mainstream of society. The movement has no interest in seizing, much less
overthrowing, the government, but rather in creating an environment in which power is
constrained through constitutional government and civil society. This middle road seeks
to transcend the traditional alternatives of passive reform and tumultuous revolution,
and to forgo petty antagonistic politics for a broad-minded politics that addresses the
concerns of ordinary citizens. It draws on gradualist theories of political change, like
Karl Popper’s concept of ‘‘piecemeal social engineering’’ and John Dewey’s model of
democratic experimentation, rather than grand utopian project of overnight solutions.
Its goal is a society in which citizens can associate on the basis of their views, not their
class position or their place in the political system. The Internet, and especially
microblogging platforms, have raised the consciousness of millions of Chinese
who, having met their material needs, are looking for the opportunity to shape
their country’s future. Many of the participants in this ‘‘intermediate society’’ are
professionals who spurn the ideological trappings of class struggle; they want
change, but in an orderly and civilized way, from the ground up. Mr. Wang has
described this movement as ‘‘constructive opposition.’’ Yet this reasoned, moderate
movement has drawn intolerance and hostility from Beijing. As the Third Plenum
shows, the government only wants change on its own timetable, and in accordance with
its needs. Ordinary citizens are sidelined. China’s leaders have declared that ‘‘special
interests’’ are the greatest obstacle to reform, but an even greater problem is the
party elite’s lust to maintain its power, and its terror of a public that wants to help
determine its future. The price of this resistance is steep. Mr. Wang recently celebrated
his 52nd birthday behind bars. When Mr. Xu was arrested, more than four months ago,
his wife was pregnant, and he will almost certainly not be able to see the birth of his
child. Mr. Guo has been detained for the fourth time, and his wife and children have
taken refuge in the United States. Even so, these activists remain unbowed; for all
their moderation, they do not lack courage or tenaciousness, and no
amount of brutality will make them give up their pursuit of a civilized
society as both an end and a means. Can the Chinese government afford complacency
in the face of their quiet activism? How can the so-called reforms succeed if the
government continues to defy the Chinese people’s growing demands for dignity and
justice?
O/V: Currently in the status quo the United States has an Internet Freedom agenda in
which they vouch for a free internet across the world, however, currently US
surveillance programs, such as Prism, are creating a bad perception throughout other
countries throughout the world. This perception is leading to an increase in data
localization, where other countries are attempting to isolate themselves and block any
outside connections to their internal network. In China, there are increased movements
under a globalized data source Chinese political activists are still able to get around
strict Chinese regulations and voice their message. However, if data becomes localized
the Chinese government will crack down and shut down these political activists. The
Chinese have always abused the human rights of their people and they often allow little
things to improve to allow a greater grip on their people. Only with Internet Freedom
can the Chinese political activists continue to object to these human rights violations of
the Chinese gov.
Woman NGO’s
Information and Community Technologies (ICTs) offered within
Internet Freedom will allow Women to empower themselves and
create movements
Bonder, is an Argentine researcher and gender activist and she founded the
Center for Women's Studies (CEM) and coordinator of the International
Working Group on Women and ICT field of the United Nations, November
2002
(Gloria, “From access to appropriation: Women and ICT policies in Latin American and
the Caribbean” http://www.un.org/womenwatch/daw/egm/ict2002/reports/PaperGBonder.PDF pg. 7-10)//NC
For the preparation of this document, an electronic consultation was carried out among Latin American researchers, educators and
activists involved in projects on / with women / gender and ICT11 . 12 We wanted to learn more about the current situation of
women/ gender and ICTs in the Region, identify new experiences in practice, recognize their needs and demands and consider the
strategic orientations they propose for increasing and strengthening gender fair projects and policies. ¸ All of them show high
appraisal of
the opportunities that ICTs offer to women as a means of
exchanging information, and building and participating in national,
regional and international networks. ¸ According to some of them, the use of ICTs has
brought about a spectacular progress in terms of organization, articulation of
demands, legitimacy, knowledge building , and creation of alliances among
women NGOs over the last decade. ¸ They highlighted the coordination of women NGOs around the preparation for World
Conferences such as the ones in Beijing, Durban and the Social Forum in Porto Alegre; their follow-up as well as the
continuous actions of advocacy and networking around significant topics such as
poverty, sexual and reproductive health, women’s rights, etc. at national and regional
levels. Experiences like community telecenters13 (http://www.tele-centros.org/) thoroughly spread in almost all Latin American
countries14 were presented as positive examples of democratization of the Internet, motivation
for women participation and leadership in these areas, stimulation of the
social uses of the Internet, and active and informed inclusion of
marginalized sectors. Together with community radio stations, telecenters have become important resources for
building a sense of community identity and increasing citizen consciousness
and participation in defense of people’s rights and interests. The use of the Internet by
rural and indigenous groups and communities for the commercialization of handmade products and other experiences aimed to
revalue and disseminating their original cultures were mentioned as relevant achievements. 15 16 The work carried out by APC in the
Region and the GEM17 project in particular were seen as an important step forward in order to produce knowledge on projects in
progress, learn about “goods practices” and thus improve the planning, implementation and evaluation of new projects. ¸ From the
political-institutional point of view, the Brazilian participants highlighted the value of associative projects between NGOs and the
government in the creation of telecenters and other related projects. As an example they mentioned the cooperation between the
government of San Pablo and RITS18 who manage over 100 free and public access telecenters in that city, from which they are
beginning to produce content for ICT educational projects in communities with high level of violence. ¸ While most of them admit
that transnational corporations and their economic interests are the most powerful factors affecting the creation and spreading of
the new technologies, they insist on the fact that Latin American social
movements and women NGOs in
particular are starting to appropriate ICTs for participatory and organizational purposes.
In doing so they are generating a new political culture along with alternative content
on the web. “Today, social movements, groups and individuals publish thousands of bulletins, dossiers, documents,
newsletters, magazines and even newspapers on the Internet. People who may not be able to print their newsletter or magazine are
able to post it on the web, and most of these publications have become good alternatives sources of information to the mainstream
media. In addition, there are independent and community radio stations broadcasting on the web and TV initiatives that use the web
casting to transmit their images and information” 19 ¸ In their view the prevailing problems are: 1. Lack of statistical information
and qualitative research on women and ICTs and on gender differences in access, uses and production of these technologies. 2.
Persistence of connectivity problems due to lack of infrastructure , high costs of equipment and telecommunications, concentration
of resources in urban centers and economic and educational shortcomings of the most marginal populations, and particularly
women. 3. Lack of acknowledgement on the part of governments of gender inequities in all the social areas and particularly in the
technological and scientific fields, and the consequent absence of gender fair public policies. 4. Need to advance, both at the
theoretical and at the strategic levels, from the initial focus on access to the technologies on the part of women, toward the creation
of conditions and resources that favor their appropriation of this tool to meet their needs and those of their communities. 5. Concern
for the penetration of values, models and aspirations representing an hegemonic cultural model which excludes the cultural diversity
of LAC. 6. Concern for the lack of awareness and still weak commitment of the women’s movement and NGOs in the struggle for
ICTs as a fundamental tool for political and cultural transformation. It is widely admitted that the ICT field is one of last areas
influenced by a gender perspective, which explains that gender activists, researchers and educators involved in this field are still very
few and they have not yet achieved a coordination of efforts that enables a stronger incidence on national and regional policies. 7.
Educational programs fostering the use of ICTs among women, particularly girls and young women, are highly instrumental and not
gender sensitive. There is a need to develop educational projects that stimulate critical and creative skills and that encourage greater
participation of women in the design and production of new technologies. 8. Difficulties in order to efficiently administer the
immense flow of information that the Internet offers. This requires an educational and cultural capital that many women lack, and
that cannot be provided through mere access to computers. Intelligent and selective connection demands much more time than
women usually have due to their family and work duties. “It is a third -or even a fourth- work day.” 9. Certain resistance on the part
of women and NGOs to the use of technological tools other than the e-mail. The lack of infrastructure and technological skills, along
with other educational and cultural factors, are preventing women from becoming producers of new contents and of formats that are
attractive and powerful from the communicational point of view. “I believe that women organizations could develop more interactive
sites rather than just electronic ones, as is the case of most of the NGOs websites" Recommended Strategies 1. To consider
ICTs as an essential tool for increasing gender equality while actively
engaging in fostering social and economic development in LAC. 2. To focus the debate
and the political activism in/for ICTs within a frame of human rights and human
development. For many participants, women involvement in programs and policies would
gain force, impact and social relevance if they associated ICTs with the
struggle against poverty, unemployment, violence, racism, discrimination
and the consolidation of democracy and economic growth. 3. To motivate, through educational
programs and other means, women appropriation of ICTs towards increasing their citizen
identity and their active participation in the political and economic life of their
communities. “Women are understanding that in the current informatic society, quick access to relevant information is
essential for an effective intervention, in order to participate in the decisions, propose viable alternatives and establish priorities,
with the purpose of influencing the different spheres of their society.” 20 4. To establish alliances between government, civil society,
business and international organisms to implement effective and sustainable ICT policies and programs that contribute to gender
equality and social equity. 5. To sensitize women in political positions, both in the executive and in parliament, on the gender
dimensions of the new technologies so that they support laws , regulations and projects that address women needs and avoid sexist
biases
Another impact of loss of women’s movements: This patriarchal
orientation causes extinction through environmental
degradation, mass violence and war
Warren and Cady 94—Warren is the Chair of the Philosophy Department at Macalester College and Cady is Professor
of Philosophy at Hamline University (Karen and Duane, “Feminism and Peace: Seeing Connections”, p. 16, JSTOR,
http://www.jstor.org/stable/pdfplus/3810167.pdf)
Operationalized, the evidence of patriarchy as a dysfunctional system is found in the behaviors to which it gives rise, (c), and the
unmanageability, (d), which results. For example,
in the United States, current estimates are that one out of every
three or four women will be raped by someone she knows; globally, rape, sexual
harassment, spouse-beating, and sado-masochistic pornography are examples of
behaviors practiced, sanctioned, or tolerated within patriarchy. In the realm of environmentally
destructive behaviors, strip-mining, factory farming, and pollution of the air, water, and soil are
instances of behaviors maintained and sanctioned within patriarchy. They, too, rest on
the faulty beliefs that it is okay to "rape the earth," that it is "man's God-given right" to
have dominion (that is, domination) over the earth, that nature has only instrumental value, that
environmental destruction is the acceptable price we pay for "progress."And the presumption of warism, that war is a natural,
righteous, and ordinary way to impose dominion on a people or nation, goes hand in hand with patriarchy and leads to dysfunctional
behaviors of nations and ultimately to international unmanageability. Much
of the current" unmanageability" of
contemporary life in patriarchal societies, (d), is then viewed as a consequence of a
patriarchal preoccupation with activities, events, and experiences that reflect historically
male-gender identified beliefs, values, attitudes, and assumptions. Included among
these real-life consequences are precisely those concerns with nuclear proliferation,
war, environmental destruction, and violence toward women, which many
feminists see as the logical outgrowth of patriarchal thinking. In fact, it is often only through observing
these dysfunctional behaviors-the symptoms of dysfunctionality that one can truly see that and how patriarchy serves to maintain
and perpetuate them. When patriarchy is understood as a dysfunctional system, this "unmanageability" can be seen for what it is-as
a predictable and thus logical consequence of patriarchy.'1 The theme that global environmental crises, war, and violence generally
are predictable and logical consequences of sexism and patriarchal culture is pervasive in ecofeminist literature (see Russell 1989,
2). Ecofeminist Charlene Spretnak, for instance, argues that "militarism
and warfare are continual features
of a patriarchal society because they reflect and instill patriarchal values and fulfill
needs of such a system. Acknowledging the context of patriarchal conceptualizations that feed militarism is a first step
toward reducing their impact and preserving life on Earth" (Spretnak 1989, 54). Stated in terms of the foregoing model of patriarchy
as a dysfunctional social system, the claims by Spretnak and other feminists take on a clearer meaning:
Patriarchal
conceptual frameworks legitimate impaired thinking (about women, national and
regional conflict, the environment) which is manifested in behaviors which, if
continued, will make life on earth difficult, if not impossible. It is a stark message, but it is
plausible. Its plausibility lies in understanding the conceptual roots of various woman-nature-peace connections in regional,
national, and global contexts.
XTN
O/V: Currently in the status quo the United States has an Internet Freedom agenda in
which they vouch for a free internet across the world, however, currently US
surveillance programs, such as Prism, are creating a bad perception throughout other
countries throughout the world. This perception is leading to an increase in data
localization, where other countries are attempting to isolate themselves and block any
outside connections to their internal network. Currently women, even in developing
countries, are making use of the internet and communication technologies to be able to
spread ideas to rebel against patriarchal customs as well as spread their ideas to other
women to create different movements. To counter (insert impact), there needs to be
globalized data for these women to access information and have increased movements.
This subordination of women amounts to a war against those
who are subjected to gendered violence – their refusal to
acknowledge this as a war is a link
Ray, US Court of Appeals for the Fourth Circuit, 2-1997 [Amy, American University Law Review]
Because, as currently constructed, human rights laws can reach only individual perpetrators during times
of war, one alternative is to reconsider our understanding of what constitutes "war" and what constitutes
"peace." <=265> n264 When it is universally true that no matter where in the world a woman lives or with
what culture she identifies, she is at grave risk of being beaten, imprisoned, enslaved, raped, prostituted,
physically tortured, and murdered simply because she is a woman, the term "peace" does not describe
her existence. <=266> n265 In addition to being persecuted for being a woman, many women also are
persecuted on ethnic, racial, religious, sexual orientation, or other grounds. Therefore, it is crucial that our
re-conceptualization of [*837] human rights is not limited to violations based on gender. <=267> n266
Rather, our definitions of "war" and "peace" in the context of all of the world's persecuted groups should
be questioned. Nevertheless, in every culture a common risk factor is being a woman, and to describe the
conditions of our lives as "peace" is to deny the effect of sexual terrorism on all women. <=268> n267
Because we are socialized to think of times of "war" as limited to groups of men fighting over physical
territory or land, we do not immediately consider the possibility of "war" outside this narrow definition
except in a metaphorical sense, such as in the expression "the war against poverty." However, the
physical violence and sex discrimination perpetrated against women because we are women is hardly
metaphorical. Despite the fact that its prevalence makes the violence seem natural or inevitable, it is
profoundly political in both its purpose and its effect. Further, its exclusion from international human rights
law is no accident, but rather part of a system politically constructed to exclude and silence women.
<=269> n268 The appropriation of women's sexuality and women's bodies as representative of men's
ownership over women has been central to this "politically constructed reality." <=270> n269 Women's
bodies have become the objects through which dominance and even ownership are communicated, as
well as the objects through which men's honor is attained or taken away in many cultures. <=271>
n270 Thus, when a man wants to communicate that he is more powerful than a woman, he may beat her.
When a man wants to communicate that a woman is [*838] his to use as he pleases, he may rape her or
prostitute her. The objectification of women is so universal that when one country ruled by men (Serbia)
wants to communicate to another country ruled by men (Bosnia-Herzegovina or Croatia) that it is superior
and more powerful, it rapes, tortures, and prostitutes the "inferior" country's women. <=272> n271 The
use of the possessive is intentional, for communication among men through the abuse of women is
effective only to the extent that the group of men to whom the message is sent believes they have some
right of possession over the bodies of the women used. Unless they have some claim of right to what is
taken, no injury is experienced. Of course, regardless of whether a group of men sexually terrorizing a
group of women is trying to communicate a message to another group of men, the universal sexual
victimization of women clearly communicates to all women a message of dominance and ownership over
women. As Charlotte Bunch explains, "The physical territory of [the] political struggle [over female
subordination] is women's bodies." <=273> n272 Given the emphasis on invasion of physical territory as
the impetus of war between nations or groups of people within one nation, we may be able to reconceive
the notion of "war" in order to make human rights laws applicable to women "in the by-ways of daily life."
<=274> n273 We could eradicate the traditional public/private dichotomy and define oppression of
women in terms traditionally recognized by human rights laws by arguing that women's bodies are the
physical territory at issue in a war perpetrated by men against women. Under this broader definition of
"war," any time one group of people systematically uses physical coercion and violence to subordinate
another group, that group would be perpetrating a war and could be prosecuted for human rights
violations under war crimes statutes.
Soft Power
Warming
PRISM hurts US soft power and cooperation
Arkedis 13, Jim Arkedis a senior fellow at the Progressive Policy Institute. He is the co-author of Political Mercenaries. (Jim Arkedis,
The Atlantic, “PRISM Is Bad for American Soft Power”, 6/19/13, http://www.theatlantic.com/international/archive/2013/06/prism-is-bad-foramerican-soft-power/277015/) //JM
This brings us back to Harry Truman and Jim Crow. Even though PRISM is technically legal, the lack of recent public debate and
support
for aggressive domestic collection is hurting America's soft power. The evidence is rolling in. The China
Daily, an English-language mouthpiece for the Communist Party, is having a field day, pointing out America's
hypocrisy as the Soviet Union did with Jim Crow. Chinese dissident artist Ai Wei Wei made the link explicitly, saying "In the Soviet Union
before, in China today, and even in the U.S., officials always think what they do is necessary... but the lesson that people should learn from
history is the need to limit state power." Even
America's allies are uneasy, at best. German Chancellor Angela
Merkel grew up in the East German police state and expressed diplomatic "surprise" at the
NSA's activities. She vowed to raise the issue with Obama at this week's G8 meetings. The Italian data protection
commissioner said the program would "not be legal" in his country. British Foreign Minister
William Hague came under fire in Parliament for his government's participation. If Americans
supported these programs, our adversaries and allies would have no argument . As it is, the next
time the United States asks others for help in tracking terrorists, it's more likely than not that
they will question Washington's motives. It's not too late. The PATRIOT Act is up for reauthorization in 2015. In the context
of a diminished threat, the White House still has time to push the public debate on still-hidden, controversial intelligence strategies (while
safeguarding specific sources and methods). Further, the administration should seek to empower the FISA court. Rather that defer to the
Supreme Court to appoint its panel of judges, it would be better to have Senate-confirmable justices serving limited terms. President Obama
has said Americans can't have 100 percent security and 100 percent privacy. But you can have an honest public debate about that allows
Americans to legitimately decide where to strike that balance. It's both the right thing to do and American foreign policy demands it.
Cooperation prevents global internet separation
Hill Internet Policy at U.S. Department of Commerce ’12 (Jonah Force Hill works in Internet Policy at the U.S. Department of
Commerce and was a research assistant at the Harvard – Belfer Center, Harvard – John F. Kennedy School of Government,
“Internet Fragmentation Highlighting the Major Technical, Governance and Diplomatic Challenges for U.S. Policy Makers”, Spring
2012, http://ecir.mit.edu/images/stories/internet_fragmentation_jonah_hill.pdf)//KY
The Internet allows for the rapid and inexpensive collection of vast
amounts of personal information and data online. Internet companies and
ISPs collect users’ information through searches, purchases, sign-ins, and HTTP cookies,
and then use that information for any number of purposes, from improved
search engine results to better-targeted advertising. But while the collection of personal
information and data has generated billions of dollars of online revenue and spawned new industries, 120 privacy
advocates around the world are up in arms about the collection and use of
this data, and what they view as a mounting threat to personal privacy and a lack of serious online consumer protections. In
response to these concerns, governments are crafting new rules addressing how digital data are collected, stored
and sold. Whether privacy protections should be enforced through legislation, or through voluntarily
measures by Internet companies, is a matter of intense debate. But if the
recent wave of new proposed privacy rules in the U.S. and internationally is any indication,
the tide of public and government opinion seems to be shifting towards
increased legal protections for Internet users and their personal
information. Hidden within these privacy deliberations, however, lies a real threat to the Internet’s
unity. Amidst the flurry of new privacy legislation under discussion in world
capitals, there has been remarkably little international coordination or agreement about what types of restrictions and
limitations should be put on the acquisition and use of online data. There are mounting concerns that if many countries adopt their
own unique privacy requirements, then
every firm operating on the Internet could
potentially be subjected to a multiplicity of often inconsistent laws. If
companies are unable to meet each country’s differing requirements, either
because those requirements are in conflict with one another or because of the added costs associated with meeting multiple
disparate rules, then we could see firms pulling out of particular markets entirely, essentially
balkanizing the
Internet by firm.
Internet decreases warming effects through decreased carbon
footprint
Reddy 12 ---writer for Huffington Post (Robbie, “The Environmental Impacts of E-Commerce - A Greener Way to
Shop?” 8/8/12, http://www.huffingtonpost.co.uk/robbie-reddy/the-environmental-impacts_b_1750438.html)//LE
For the time-crunched or the just plain lazy among us, online shopping offers clear rewards. You can buy the week's groceries and
tick everything off of your holiday list without the need to set foot outside the house or even put on pants. Yet there's another
potential benefit to buying from ecommerce shops: it can help save the environment. Don't get overly smug just
yet, because online shopping still uses energy in the form of packaging materials and the fuel used for deliveries. However, overall
ecommerce may be better for the environment. Reduced
Carbon Footprint Online retail outfits use 30 %
less energy than traditional retail operations, according to a study conducted by Carnegie Mellon University. In a brick
and mortar shop, the building needs to have display lighting, temperature regulation,
security lighting, cash registers, and shop fixtures installed. For the staff members to get
to and from work, energy is expended during the commute, and the business also uses
energy during the initial construction of the building. This also doesn't include the
energy that's expended by consumers driving to and from the shop. Choosing to buy your product
online can save these CO2 emissions. Although an ecommerce shop will still use up some degree of energy, this amount can be
significantly reduced. Employees typically work from home, or commute to a more convenient location. No energy must be
expended for customer comfort as it would in a traditional shop. Energy
is still used to deliver purchases to
consumers, but this is more efficient than every single consumer driving to and from the shop. The paper
trail of doing business can be reduced with ecommerce as well, using online newsletters and
electronic receipts.
Independently, climate change causes famine and resource wars
that go nuclear – Pentagon study
McKibben 9.
Bill. is the Schumann Distinguished Scholar at Middlebury College. In 2010, the Boston Globe called him
"probably the nation's leading environmentalist." CLIMATE CHANGE, Bill McKibben. Foreign Policy. Washington: Jan/Feb 2009. ,
Iss. 170; pg. 32.
*** cites Pentagon report as well as Harvard archaeologist Steven LeBlanc "Climate
Change Will Help as Many
Places as It Hurts" Wishful thinking. For a long time, the winners-and-losers calculus was pretty standard: Though
climate change will cause some parts of the planet to flood or shrivel up, other frigid, rainy regions would at least get some warmer
days every year. Or so the thinking went. But more recently, models
have begun to show that after a certain
point almost everyone on the planet will suffer. Crops might be easier to grow in some places for a few
decades as the danger of frost recedes, but over time the threat of heat stress and drought will almost
certainly be stronger. A 2003 report commissioned by the Pentagon forecasts the
possibility of violent storms across Europe, megadroughts across the Southwest United
States and Mexico, and unpredictable monsoons causing food shortages in China. "Envision
Pakistan, India, and China - all armed with nuclear weapons skirmishing at their
borders over refugees, access to shared rivers, and arable land," the report warned. Or
Spain and Portugal "fighting over fishing rights leading to conflicts at sea." Of course, there are
a few places we used to think of as possible winners - mostly the far north, where Canada and Russia could theoretically produce
more grain with longer growing seasons, or perhaps explore for oil beneath the newly melted Arctic ice cap. But even those places
will have to deal with expensive consequences - a real military race across the high Arctic, for instance. Want more bad news? Here's
how that Pentagon
report's scenario played out: As the planet's carrying capacity shrinks,
an ancient pattern of desperate, all-out wars over food, water, and energy supplies
would reemerge. The report refers to the work of Harvard archaeologist Steven LeBlanc,
who notes that wars over resources were the norm until about three centuries ago.
When such conflicts broke out, 25 percent of a population's adult males usually died. As
abrupt climate change hits home, warfare may again come to define human life. Set against
that bleak backdrop, the potential upside of a few longer growing seasons in Vladivostok doesn't seem like an even trade.
XTN
EXTEND Arkedis 13- NSA overreach makes foreign powers
question US motives and ruins cooperation
EXTEND Hill 12- Cooperation and Multilateralism is key to
prevent data loclaization
EXTEND Reddy 12- Internet and e-commerce decrease energy
use and environment damage
EXTEND McKibben 9- Climate change decreases planet’s
carrying capacity --- increase chance of famine and resource war
AT: No decreased on internet
Data localization dramatically harms global communication
Jonah Force Hill (Harvard Kennedy School (HKS), Belfer Center for Science and International Affairs (BCSIA)) 5/1/14, The
Growth of Data Localization Post-Snowden: Analysis and Recommendations for U.S. Policymakers and Business Leaders, The
Hague Institute for Global Justice, Conference on the Future of Cyber Governance, 2014,
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2430275, page 5
Today, more than a dozen countries, both developed and developing, have introduced or
are actively contemplating introducing data localization laws. The laws, restrictions,
and policies under consideration are diverse in their strategies and effects. Some proposals would enforce
limitations for data storage, data transfer, and data processing; others require
the local purchasing of ICT equipment for government and private sector
procurements. There are proposals for mandatory local ownership of data storage equipment, limitations on foreign
online retailers, and forced local hiring. Proposals of this sort are not historically
unprecedented. Indeed, forms of data localization policies have been actively in place in many countries for years,
including in the United States, where sensitive government data, such as certain classified materials, must be maintained within the
servers of domestic companies. Broader
localization rules, which apply to all citizen data,
have tended to be pursued by authoritarian governments such as Russia,
China, and Iran, for which data localization laws have been viewed as an
effective means to control information and to monitor the activities of their
citizens. PostSnowden, however, even democratic countries are now
seriously considering these more expansive data localization measures.
Most notably, Brazil, Germany, and India– countries that have witnessed
some of the most virulent anti-NSA reactions –are now contemplating
enacting significant data localization laws. The EU is also contemplating
localization within its area of authority.This is a deeply troubling
development – not just for the technology firms of the United States who stand
to lose customers and contracts as a result of these policies,4 but also for all
the nations, firms, and individual Internet users who rely on the Web for
economic trade and development, communications, and civic organizing.
Not only do data localization policies fail to achieve their stated goals, they
introduce a host of unintended consequences. By restricting data flows and
competition between firms, localization will likely bring up costs for
Internet users and businesses, may retard technological innovation and the
Internet’s “generativity,” 5 may reduce the ability of firms to aggregate
services and data analytics through cloud services, and will surely curb
freedom of expression and transparency globally. Ironically, data
localization policies will likely degrade – rather than improve – data
security for the countries considering them, making surveillance, protection from
which is the ostensible reason for localization, easier for domestic governments (and perhaps even for foreign
powers) to achieve. Restricted routing, often a core component of data localization
rules, may be technically infeasible without initiating a significant overhaul
of the Internet’s core architecture and governance systems, which itself
would have significant negative effects. And perhaps most worrying, data
localization policies – if implemented on a wide international scale – could
have the effect of profoundly fragmenting the Internet,6 turning back the
clock on the integration of global communication and ecommerce, and
putting into jeopardy the myriad of societal benefits that Internet
integration has engendered Unquestionably, online espionage, citizen
privacy, government overreach, and the protection of fundamental rights
are legitimate concerns of states. Advances in surveillance technologies and
offensive cyber capabilities have plainly outpaced the legal, normative, and
diplomatic mechanisms needed to protect digital data. For government
officials hoping to take meaningful action in response, data localization
looks to be a convenient and simple solution. But a close examination
reveals that it is not a viable remedy to any of the privacy, security, or
surveillance problems governments hope to address. This paper discusses these points and
seeks to expose the often dubious and pretextual motivations behind the new push for data localization, to explain how such
measures are profoundly imprudent and often self-defeating, and to offer United States businesses and the United States
government a few key recommendations for how to counter this problematic trend.
AT: Internet has no effect
Internet saves energy
Metz 15---
the editor of Wired Business and Wired Enterprise (Cade, “Google Says the Internet of Things Will Save Energy,”
4/29/15, http://www.wired.com/2015/04/google-says-internet-things-will-save-electricity/)//LE
(***iot---intenet of things)
AS THE INTERNET of Things expands, with everything from thermostats to cameras to cars plugging into the net, so does the need
for machines that can handle those connections. The data traveling to and from all those thermostats, cameras, and cars, you see,
must flow through the massive data centers operated by the likes of Google, Apple, and Facebook.
The worry is that powering all this extra hardware will require exponentially larger amounts of electricity—not to mention all the
But Urs Hölzle says this won’t be the problem it may
seem. Hölzle is the man who oversees Google’s worldwide network of data centers, and
he believes that efficiencies brought by devices such as Internet-connected thermostats,
lighting systems, and self-driving cars will balance out the extra power needed to drive
our computing centers.
money and space spent on the hardware itself.
“I’m pretty confident that the Internet of Things is going to have net negative power
consumption,” Hölzle said during a briefing with reporters on Tuesday. “If you control
lights, heat, and cooling in a smarter ways, that’s really substantial.” Even self-driving cars, he
says, will push us towards lower power consumption. “You’ll have fewer cars on the road, fewer parking lots, less congestion,
because every car is a potential carpool.” In other words, he believes we’ll use self-driving cars in much the same way we use Uber
today, calling one whenever we need one.
AT: No Extinction
Climate change causes extinction and outweighs every other
impact
Doebbler 11. Curtis, International Human Rights Lawyer.( Two threats to our existence. Ahram Weekly. July 2011.
http://weekly.ahram.org.eg/2011/1055/envrnmnt.htm)
Climate change is widely acknowledged to be the greatest threat facing humanity. It will
lead to small island states disappearing from the face of the earth, serious global threats
to our food and water supplies, and ultimately the death of hundreds of millions of the
poorest people in the world over the course of this century. No other threat -- including
war, nuclear disasters, rogue regimes, terrorism, or the fiscal irresponsibility of
governments -- is reliably predicted to cause so much harm to so many people on earth,
and indeed to the earth itself. The International Panel on Climate Change, which won the Nobel Prize for its
evaluation of thousands of research studies to provide us accurate information on climate change, has predicted that under the
current scenario of "business-as-usual", temperatures
could rise by as much as 10 degrees Celsius in
some parts of the world. This would have horrendous consequences for the most
vulnerable people in the world. Consequences that the past spokesman of 136
developing countries, Lumumba Diaping, described as the equivalent of sending
hundreds of millions of Africans to the furnace. Yet for more than two decades, states have failed to take
adequate action to either prevent climate change or to deal with its consequences. A major reason for this is that many wealthy
industrialised countries view climate change as at worst an inconvenience, or at best even a potential market condition from which
they can profit at the expense of developing countries. Indeed, history has shown them that because of their significantly higher
levels of population they have grown rich and been able to enslave, exploit and marginalise their neighbours in developing countries.
They continue in this vein.
Cyberterrorism
PRISM hurts US soft power and cooperation
Arkedis 13, Jim Arkedis a senior fellow at the Progressive Policy Institute. He is the co-author of Political Mercenaries. (Jim Arkedis,
The Atlantic, “PRISM Is Bad for American Soft Power”, 6/19/13, http://www.theatlantic.com/international/archive/2013/06/prism-is-bad-foramerican-soft-power/277015/) //JM
This brings us back to Harry Truman and Jim Crow. Even though PRISM is technically legal, the lack of recent public debate and
support
for aggressive domestic collection is hurting America's soft power. The evidence is rolling in. The China
Daily, an English-language mouthpiece for the Communist Party, is having a field day, pointing out America's
hypocrisy as the Soviet Union did with Jim Crow. Chinese dissident artist Ai Wei Wei made the link explicitly, saying "In the Soviet Union
before, in China today, and even in the U.S., officials always think what they do is necessary... but the lesson that people should learn from
history is the need to limit state power." Even
America's allies are uneasy, at best. German Chancellor Angela
Merkel grew up in the East German police state and expressed diplomatic "surprise" at the
NSA's activities. She vowed to raise the issue with Obama at this week's G8 meetings. The Italian data protection
commissioner said the program would "not be legal" in his country. British Foreign Minister
William Hague came under fire in Parliament for his government's participation. If Americans
supported these programs, our adversaries and allies would have no argument . As it is, the next
time the United States asks others for help in tracking terrorists, it's more likely than not that
they will question Washington's motives. It's not too late. The PATRIOT Act is up for reauthorization in 2015. In the context
of a diminished threat, the White House still has time to push the public debate on still-hidden, controversial intelligence strategies (while
safeguarding specific sources and methods). Further, the administration should seek to empower the FISA court. Rather that defer to the
Supreme Court to appoint its panel of judges, it would be better to have Senate-confirmable justices serving limited terms. President Obama
has said Americans can't have 100 percent security and 100 percent privacy. But you can have an honest public debate about that allows
Americans to legitimately decide where to strike that balance. It's both the right thing to do and American foreign policy demands it.
International cooperation prevents cyber attacks
Nye 10, Ph.D. in political science from Harvard University (Joseph S. Nye Jr., “Cyber Power”, p17, May 2010) //JM
Cbyer terrorism is a harder case. As we have seen, cyber
attacks are not the most attractive route
for terrorists today, but as groups develop their capacity to wreak great
damage against infrastructure over the coming years, the temptation will
grow. Since attribution will be difficult, improved defenses such as pre-emption and human intelligence become important. At a
more fundamental level, many experts believe that the long term solution is a program to re-engineer the internet to make such
attacks more difficult than under today’s structure that emphasizes ease of use rather than security. Some suggest special “opt in”
incentives for private owners of critical infrastructure (eg., finance and electricity) to join secure systems rather than rely on the
open internet (which would continue to exist for those with lower stakes and willing to tolerate greater risks.) Cyber crime can also
be reduced by similar approaches that make access to some systems more difficult than they are today. In addition, it
may be
possible to develop degrees of international cooperation to limit cyber
crime analogous to efforts to discourage piracy at an earlier era. At one time, many
governments found it convenient to tolerate some pirates and even charter privateers ( until the Declaration of Paris in 1856), and
today some governments have similar attitudes toward crime on the internet. Russia and China, for example, have refused to sign
the Council of Europe Convention on Cyber Crime which has been signed by
27 countries. But attitudes may change over time if costs exceed benefits. For example, “Russian cyber-criminals no longer
follow hands-off rules when it comes to motherland targets, and Russian authorities are beginning to drop the laisser faire policy.”73
While the immediate prospects for the convention are not promising, it is possible to imagine coalitions of the willing that set a
higher standard, and work together to raise the costs for those who violate an emergent norm, much as occurs with financial money
laundering regulations or the proliferation security initiative.
Cyber attacks can easily damage US infrastructure
Assante ‘ 14. (Michael Assante, director of Industrial Control Systems as well as Supervisory Control and Data Acquisition
Networks for the SANS Institute. “America's Critical Infrastructure Is Vulnerable To Cyber Attacks” 11/11/2014.
http://www.forbes.com/sites/realspin/2014/11/11/americas-critical-infrastructure-is-vulnerable-to-cyber-attacks/ //JJ
America’s critical infrastructure—the utilities, refineries, military defense
systems, water treatment plants and other facilities on which we depend
every day—has become its soft underbelly, the place where we are now most
vulnerable to attack. Over the past 25 years, hundreds of thousands of
analog controls in these facilities have been replaced with digital systems.
Digital controls provide facility operators and managers with remote visibility and control over every aspect of their operations,
including the flows and pressures in refineries, the generation and transmission of power in the electrical grid, and the temperatures
in nuclear cooling towers. In doing so, they have made industrial facilities more efficient and more productive.
But the
same connectivity that managers use to collect data and control devices
allows cyber attackers to get into control system networks to steal sensitive
information, disrupt processes, and cause damage to equipment. Hackers, including
those in China, Russia and the Middle East, have taken notice. While early control system breaches
were random, accidental infections, industrial control systems today have
become the object of targeted attacks by skilled and persistent adversaries.
Industrial control systems are being targeted The recently discovered Industrial Control System
modules of the HAVEX trojan are one example. The malware infiltrated an indeterminate
number of critical facilities by attaching itself to software updates
distributed by control system manufacturers. When facilities downloaded
the updates to their network, HAVEX used open communication standards
to collect information from control devices and send that information to the
attackers for analysis. This type of attack represents a significant threat to
confidential production data and corporate intellectual property and may
also be an early indicator of an advanced targeted attack on an
organization’s production control systems. Other hacks represent a direct threat to the safety of U.S.
citizens. Earlier this year, the FBI released information on Ugly Gorilla, a Chinese attacker who invaded the control systems of
utilities in the United States. While the FBI suspects this was a scouting mission, Ugly Gorilla gained the cyber keys necessary for
access to systems that regulate the flow of natural gas. Considering
that cyber attackers are
numerous and persistent—for every one you see there are a hundred you
don’t—those developments should sound alarms among executives at companies using industrial controls and with the people
responsible for protecting American citizens from attacks. To their credit, both businesses and the U.S. government have begun to
take action; however, neither is adequately addressing the core of the issue. The
threat isn’t static
Businesses continue to believe that cybersecurity issues can be addressed
solely through technology. The problem was created by technology so the solution must be more technology, they
reason, ignoring the spirit of Einstein’s observation that “no problem can be solved from the same level of consciousness that created
it.” Technology is static and the threat is not. Hackers will always find a way to beat technology-based solutions. That’s why we have
to do more than create barriers to keep out intruders. We have to man our digital borders with people who have the same skill and
determination as the attackers.
An attack on critical infrastructure causes economic collapse
Hayden et al 14 (Michael,- former director of the Central Intelligence Agency and the National Security Agency. Curt
Hébert is a former chairman of the Federal Energy Regulatory Commission. And Susan Tierney is a former assistant secretary of
Energy. All three are co-chairs of the Bipartisan Policy Center's Electric Grid Cyber Security Initiative “How to protect our electric
grid: Column”) //JJ
Rather, cyber
threats to critical infrastructure -- for example, water, energy and
telecommunications — are important to our national security. There is evidence that
energy systems, in particular, are becoming a popular target. The Department of
Homeland Security recently reported responding to 198 cyber-incidents in 2012 across all critical sectors. Forty-one percent of these
incidents involved the energy sector, particularly electricity. Although to date there are no reports of a
successful cyber
attack on the electric grid, we believe it is more a question of "when" than "if." A targeted
cyber attack — either alone or combined with a physical attack — on the power system could lead to huge
costs, with sustained outages over large portions of the electric grid and prolonged
disruptions in communications, health care delivery and food and water supplies. Unlike traditional threats to electric grid
reliability, such as extreme weather events, a cyber attack is less predictable in its timing and potentially more difficult to diagnose
and address. Such an attack could come from various sources and target many potential vulnerabilities. The North American
electricity grid is sprawling, with approximately 5,800 major power plants and more than 450,000 miles of high-voltage
transmission lines. And our economy is pervasively dependent upon its functioning.
Efforts to prevent and respond to cyber attacks on the electric grid are complicated by a complex governance structure. In addition
to the countless companies involved with pieces of the grid and actions to protect it, numerous federal, state and local agencies are
involved in some aspect of cybersecurity. Successfully managing cybersecurity risks and recovering from a destructive cyber attack
will require effective coordination at several levels, including U.S. energy companies, the intelligence community and emergency
management agencies; between relevant federal government and state and local authorities involved in energy, law enforcement,
essential services and other issues; and between U.S. energy regulatory and security agencies and their counterparts in Canada and
Mexico. To address new and evolving threats of cyber attacks on the grid, the Bipartisan Policy Center convened an expert advisory
group to develop policy
approaches that would improve protection of the grid and
increase preparedness in the case of an attack. We believe there must be a series of new, innovative approaches to
address the evolving threat. Recommendations include: Public-private partnerships that mobilize the respective
assets and expertise of industry and government agencies, and improve the flow of information among
government and companies -- such as this month's GridEx exercise, which joins industry and government in an
extensive simulation of a cyber attack.
XTN
EXTEND Arkedis 13- NSA overreach makes foreign powers
question US motives and ruins cooperation
EXTEND Nye 10- International cooperation can be used to fight
against cyberterrorism
EXTEND Assante 14 and Hayden 14- Cyber attacks can easily
target and damage US infrastructure, like industrial control
systems, and ruin the US economy
At: No Cyber attacks
Cyber attack risk high --- ISIS hacking ability
Silber and Garrie 4/17 Silber is executive managing director of K2 Intelligence and former director of intelligence
analysis for the New York Police Department. Garrie is the founder and editor in chief of the Journal of Law and Cyber Warfare
(Silber and Garrie, “Guarding Against a ‘Cyber 9/11’”, http://www.wsj.com/articles/guarding-against-a-cyber-9-11-1429138821
,4/17/15) //JM
The Internet provides an easy, low-cost and low-risk means for nonstate
actors or terrorist groups to amplify the impact of any attack. But a large-scale
cyberattack on critical infrastructure could prove devastating. Whether it’s called “Cyber 9/11” or “Cyber Pearl Harbor,”
senior U.S.
officials, including the president, have warned of the possibility of attacks
launched by foreign hackers that could cripple the country by taking down the power grid, water infrastructure,
transportation networks and the financial system. Islamic State, aka ISIS,
recently released a video
threatening another 9/11-magnitude attack on the U.S. Clearly well-funded, ISIS has
proved to be the most sophisticated terrorist group so far when it comes to
utilization of digital media for recruitment and propaganda. Last week a French
television network, TV5 Monde, was digitally commandeered by ISIS-inspired hackers
who cut the transmission of 11 channels and took over the station’s website and
social-media accounts for 24 hours.
AT: Cyber secure
The NSA makes backdoors --- weakens encryption
Reuters ’13. “Exclusive: Secret contract tied NSA and security industry pioneer” BY
JOSEPH MENN. December 20, 2013. http://www.reuters.com/article/2013/12/21/ususa-security-rsa-idUSBRE9BJ1C220131221 //JJ
As a key part of a campaign to embed encryption software that it could
crack into widely used computer products, the U.S. National Security
Agency arranged a secret $10 million contract with RSA, one of the most
influential firms in the computer security industry, Reuters has learned.
Documents leaked by former NSA contractor Edward Snowden show that the NSA
created and promulgated a flawed formula for generating random numbers
to create a "back door" in encryption products, the New York Times reported in
September. Reuters later reported that RSA became the most important
distributor of that formula by rolling it into a software tool called Bsafe that
is used to enhance security in personal computers and many other
products. Undisclosed until now was that RSA received $10 million in a deal
that set the NSA formula as the preferred, or default, method for number
generation in the BSafe software, according to two sources familiar with the
contract. Although that sum might seem paltry, it represented more than a third of the
revenue that the relevant division at RSA had taken in during the entire previous year,
securities filings show. The earlier disclosures of RSA's entanglement with the NSA
already had shocked some in the close-knit world of computer security experts. The
company had a long history of championing privacy and security, and it played a leading
role in blocking a 1990s effort by the NSA to require a special chip to enable spying on a
wide range of computer and communications products. RSA, now a subsidiary of
computer storage giant EMC Corp, urged customers to stop using the NSA formula after
the Snowden disclosures revealed its weakness. RSA and EMC declined to answer
questions for this story, but RSA said in a statement: "RSA always acts in the best
interest of its customers and under no circumstances does RSA design or enable any
back doors in our products. Decisions about the features and functionality of RSA
products are our own." The NSA declined to comment. The RSA deal shows one way
the NSA carried out what Snowden's documents describe as a key strategy
for enhancing surveillance: the systematic erosion of security tools. NSA
documents released in recent months called for using "commercial
relationships" to advance that goal, but did not name any security
companies as collaborators. The NSA came under attack this week in a landmark
report from a White House panel appointed to review U.S. surveillance policy. The panel
noted that "encryption is an essential basis for trust on the Internet," and called for a
halt to any NSA efforts to undermine it. Most of the dozen current and former
RSA employees interviewed said that the company erred in agreeing to such
a contract, and many cited RSA's corporate evolution away from pure
cryptography products as one of the reasons it occurred. But several said that
RSA also was misled by government officials, who portrayed the formula as a secure
technological advance. "They did not show their true hand," one person briefed on the
deal said of the NSA, asserting that government officials did not let on that they knew
how to break the encryption. STORIED HISTORY Started by MIT professors in the
1970s and led for years by ex-Marine Jim Bidzos, RSA and its core algorithm were both
named for the last initials of the three founders, who revolutionized cryptography. Little
known to the public, RSA's encryption tools have been licensed by most large technology
companies, which in turn use them to protect computers used by hundreds of millions
of people. At the core of RSA's products was a technology known as public
key cryptography. Instead of using the same key for encoding and then decoding a
message, there are two keys related to each other mathematically. The first, publicly
available key is used to encode a message for someone, who then uses a second, private
key to reveal it. From RSA's earliest days, the U.S. intelligence establishment
worried it would not be able to crack well-engineered public key
cryptography. Martin Hellman, a former Stanford researcher who led the
team that first invented the technique, said NSA experts tried to talk him
and others into believing that the keys did not have to be as large as they
planned. The stakes rose when more technology companies adopted RSA's methods
and Internet use began to soar. The Clinton administration embraced the Clipper Chip,
envisioned as a mandatory component in phones and computers to enable officials to
overcome encryption with a warrant. RSA led a fierce public campaign against the effort,
distributing posters with a foundering sailing ship and the words "Sink Clipper!" A key
argument against the chip was that overseas buyers would shun U.S.
technology products if they were ready-made for spying. Some companies say
that is just what has happened in the wake of the Snowden disclosures.
Nuclear war Add-on
A massive cyber-attack would be an act of war
Mandia 13, the founder and chief executive of Mandiant, discusses cyber-attacks on US companies and organizations.
(Kevin Mandia, “Successful hacker attack could cripple U.S. infrastructure, experts say”,
http://usnews.nbcnews.com/_news/2013/02/19/17019005-successful-hacker-attack-could-cripple-us-infrastructure-expertssay?lite) //JJ
A report tying the Chinese military to computer attacks against American interests has sent a chill through cyber-security
experts, who worry that the very lifelines of the United States — its energy pipelines, its
water supply, its banks — are increasingly at risk. The experts say that a successful hacker
attack taking out just a part of the nation’s electrical grid, or crippling
financial institutions for several days, could sow panic or even lead to loss
of life. “I call it cyberterrorism that makes 9/11 pale in comparison,” Rep. Mike Rogers, a
Michigan Republican and chair of the House Intelligence Committee, told NBC News on Tuesday. An American computer security
company, Mandiant, reported with near certainty that members of a sophisticated Chinese hacking group work out of the
headquarters of a unit of the Chinese army outside Shanghai. The report was first detailed in The New York Times, which said that
the hacking group’s focus was increasingly on companies that work with American infrastructure, including the power grid, gas lines
and waterworks. The Chinese embassy in Washington told The Times that its government does not engage in computer hacking. As
reported, the Chinese attacks constitute a sort of asymmetrical cyberwarfare, analysts said, because they bring the force of the
Chinese government and military against private companies. “To us that’s crossing a line into a class of victim that’s not prepared to
withstand that type of attack,” Grady Summers, a Mandiant vice president, said on the MSNBC program “Andrea Mitchell Reports.”
The report comes as government officials and outside security experts alike are sounding ever-louder alarms about the vulnerability
of the systems that make everyday life in the United States possible. A new report confirmed by U.S. intelligence officials has
pinpointed a building in Shanghai where those working for the Chinese military launched cyberattacks against 141 US companies
spanning 20 industries. NBC's Andrea Mitchell reports. Outgoing Defense Secretary Leon Panetta warned in October that the United
States was facing a threat that amounted to “cyber Pearl Harbor” and raised the specter of intentionally derailed trains,
contaminated water and widespread blackouts. “This
is a pre-9/11 moment,” Panetta told
business executives in New York. “The attackers are plotting.” The Times report
described an attack on Telvent, a company that keeps blueprints on more than half the oil and gas pipelines in North and South
America and has access to their systems. A Canadian arm of the company told customers last fall that hackers had broken in, but it
immediately cut off the access so that the hackers could not take control of the pipelines themselves, The Times reported. Dale
Peterson, founder and CEO of Digital Bond, a security company that specializes in infrastructure, told NBC News that these attacks,
known as vendor remote access, are particularly worrisome. “If you are a bad guy and you want to attack a lot of different control
systems, you want to be able to take out a lot,” he said. “The
dirty little secret in these control
systems is once you get through the perimeter, they have no security at all.
They don’t even have a four-digit pin like your ATM card.” Locals walks in front of 'Unit 61398', a secretive Chinese military unit, in
the outskirts of Shanghai. The unit is believed to be behind a series of hacking attacks, a U.S. computer security company said. The
34-minute blackout at the Super Bowl earlier this month highlighted weak spots in the nation’s power system.
A National
Research Council report declassified by the government last fall warned
that a coordinated strike on the grid could devastate the country. That
report considered blackouts lasting weeks or even months across large
parts of the country, and suggested they could lead to public fear, social
turmoil and a body blow to the economy. Vital systems do not have to be
taken down for very long or across a particularly widespread area, the
experts noted, to cause social disorder and to spread fear and anxiety
among the population. Last fall, after Hurricane Sandy battered the Northeast, it took barely two days for reports of
gasoline shortages to cause hours-long lines at the pumps and violent fights among drivers. Peterson described being in Phoenix,
Ariz., during a three-day gas pipeline disruption “when people were waiting in line six hours and not going to work. You can imagine
someone does these things maliciously, with a little more smarts, something that takes three months to replace.” Similarly, hacking
attacks last fall against major American banks — believed by some security experts and government officials to be the work of Iran —
amounted to mostly limited frustration for customers, but foreshadowed much bigger trouble if future attacks are more
sophisticated. What worries Dmitri Alperovitch, co-founder of the computer security company CrowdStrike, is a coordinated attack
against banks that modifies, rather than destroys, financial data, making it impossible to reconcile transactions. “You
could
wreak absolute havoc on the world’s financial system for years,” he said. “It would
be impossible to roll that back.” While the report Tuesday focused on China, the experts
also highlighted Iran as a concern. That is because China, as a “rational actor” state, knows that a
major cyberattack against the United States could be construed as an act of
war and would damage critical economic cooperation between the U.S. and China. “With
the Iranians in the game,” Rogers said, “what’s worrisome is they don’t care.
They have no economic lost opportunity.” Security experts have for years expressed concern, if not
outrage, that the nation’s critical infrastructure remains so vulnerable so long after Sept. 11, 2001. But the escalating threats from
hackers in China and Iran, in addition to Russia and North Korea, appear to be lending new urgency to efforts to make sure
companies and government agencies are better prepared. President Barack Obama announced in his State of the Union message last
week that he had signed an executive order directing federal agencies to share certain unclassified reports of cyber threats with
American companies. The next day, Rogers and Rep. Dutch Ruppersberger, a Maryland Democrat, reintroduced legislation designed
in part to help companies share information. The bill passed the House last year but stalled in the Senate. State
Department spokeswoman Victoria Nuland said Tuesday that the United
States has “substantial and growing” concerns about threats to the U.S.
economy and national security posed by cyberattacks. “I think as recent public reports make
clear, we’re obviously going to have to keep working on this,” she said. “It’s a serious concern.” Peterson said that oil, gas and electric
companies had led the way in developing security perimeters, with water companies “kind of in the middle” and transportation and
mining companies lagging. But even the protections enacted by companies so far leave too many holes, he said. “They’re all in the
same situation,” Peterson said. “If you get through the perimeter, you can do whatever you want.”
A U.S. security
firm has exposed the role of the Chinese military in an overwhelming
number of cyber-attacks on U.S. infrastructure, government agencies, and
corporations, resulting in the theft of information from military
contractors and energy companies. Mandiant Vice President Grady Summers and Chris Johnson of the
Center for Strategic and International Studies discusses.
One nuke is all it takes
Betts 2k [Richard Professor and the Director of the Institute of War and Peace Studies at Columbia, “Universal Deterrence or
Conceptual Collapse? Liberal Pessimism and Utopian Realism,” The Coming Crisis: Nuclear Proliferation, U.S. Interests, and World
Order, ed. Utgoff p. 82] //JJ
Quite opposite reactions are imaginable. The shock might jar sluggish statesmen into taking the danger seriously, cutting through
shock might
prompt panic and a rush to stock up on WMD, as the possibility of use
underlines the need for deterrent capability, or the effectiveness of such
weapons as instruments of policy One seldom-noticed danger is that breakage of the taboo
could demystify the weapons and make them look more conventional than our
post-Hiroshima images of them. It helps to recall that in the 1930s, popular images of conventional
strategic bombing were that it would be apocalyptic, bringing belligerent countries to their
diplomatic and military red tape, and undertaking dramatic actions to push the genie back in the bottle. Or the
knees quickly. The apocalyptic image was fed by the German bombing of Guernica, a comparatively small city in Spain. When World
War II came in Europe, both British
and Germans initially refrained from bombing
attacks on cities. Once city bombing began and gathered steam, however, it
proved to be far less decisive than many had expected. British and German populations
managed to adjust and absorb it. Over time, however, the ferocity of Allied bombing of Germany and Japan did
approach the apocalyptic levels originally envisioned. In short, dire assumptions about the awesomeness of
strategic bombing deterred its initiation, but once initiated did not prevent gradual
escalation to the devastating level originally envisioned. Nuclear weapon inventories of
countries like India and Pakistan are likely to remain small in number and yield for some time. According to press reports, by some
U.S. estimates the yields of the 1998 tests were only a few kilotons. If the first weapon detonated in combat is a low-yield device in a
large city with uneven terrain and lots of reinforced concrete, it might only destroy a small part of the city A bomb that killed 10,000
to 20,000 people would be seen as a stunning catastrophe, but there are now many parts of the world where that number would be
less than 1 percent of a city’s population. The disaster could seem surprisingly limited, since in the
popular imagination (underwritten by the results in the small and flimsy cities of Hiroshima and Nagasaki), nuclear weapons mean
‘one bomb, one city” Awful destruction that yet seems surprisingly limited could prompt revisionist reactions among lay elites in
some countries about the meaning of nuclear ordnance.
Bilateral Dialogues
SCS
*NSA surveillance is worsening American economy
Forbes ’13. “NSA Snooping's Negative Impact On Business Would Have The Founding
Fathers 'Aghast'” Mieke Eoyang & Gabriel Horwitz. 12/20/2013
http://www.forbes.com/sites/realspin/2013/12/20/nsa-snoopings-negative-impact-onbusiness-would-have-the-founding-fathers-aghast/ //JJ
James Madison would be “aghast.” That was one of the incendiary charges leveled at the
National Security Agency and its mass surveillance activities by Judge Richard Leon in
his December 16 opinion ordering the government to stop collecting some of the data
that it’s been gathering on private citizens here and abroad. But Thomas Jefferson might
be horrified as well, because the NSA collection efforts are having a fairly profound
effect on American business and its efforts to sell goods and services abroad. Jefferson, a
big believer in the American “taste for navigation and commerce,” would be dismayed
that our government was doing things that could hurt our competitiveness and our
ability to set the terms of global trade. To be sure, there has always been some tension
between U.S. high-tech industries and our national security. In the 90s, the rules were
fairly primitive, such as limitations on exports of high-performance computing designed
to prevent countries from developing weapons of mass destruction. Those restrictions
were quickly rendered outdated by Moore’s Law, but had they remained they would
have prevented the exports of game consoles like Xbox. Since then, increased
globalization and the rise of terrorist organizations operating in the
shadows and across national boundaries have complicated both the
security and economic issues. The current debate about Edward Snowden’s
intelligence revelations may seem like an unlikely place to see that tension emerge, but
beyond the discussions of civil liberties and counterterrorism, it is becoming clear
that the post-9/11 surveillance apparatus may be at cross-purposes with our
high-tech economic growth. The revelations about the scope and scale of
NSA’s surveillance both at home and abroad have made many uneasy about
the security of their data. This loss of trust could have ongoing
consequences for the U.S. economy and for the future development of the
Internet. Policymakers must understand these implications as they make decisions on
how to reform our surveillance efforts. First, what will this mean for American
competitiveness? For years, the Internet has been largely “Made in America”,
but the technical architecture and data transcend national borders.
European, Chinese, Russian, and other global competitors are vying for the billions of
consumers who currently use U.S. Internet services every day—from Google to Facebook
to Ebay. One major competitive global advantage for U.S. companies is that
America’s openness and freedoms have brought an implied level of trust in
the security and privacy of the data flowing through their servers. But when
the U.S. government asserts that it can exploit electronic data abroad for intelligence
purposes, it creates an international reaction with profound economic consequences.
For example, Europe’s Commissioner for digital affairs, Neelie Kroes, predicts the
fallout from Snowden’s leaks will have “multi-billion Euro consequences” for US
businesses. The EU Commission’s Vice President, Viviane Reding, is pushing for Europe
to adopt more expansive privacy laws that will help build market share for regional
companies—thereby shutting American companies out. The economic
consequences could be staggering. Studies by leading Internet researchers at ITIF,
Gartner, and Forrester examining the NSA surveillance revelations’ impact project
potential lost revenue for U.S. cloud computing companies ranging from $35
billion to $180 billion over the next three years. More than half of the overseas
members of a cloud industry group, the Cloud Security Alliance, said they were less
likely to use U.S. cloud providers in the future. Ten percent of such members said they
had cancelled a U.S. cloud services project as a result of the “Snowden Incident”. While
the true costs of the loss of trust are hard to quantify, and will be reported in future
quarters, the potential losses are enormous.
The technology industry is vital to the American Economy
Brookings Institution February 3, 2015. “America's Advanced Industries”
http://www.brookings.edu/research/reports2/2015/02/03-advancedindustries#/M10420
The need for economic renewal in the United States remains urgent. Years of
disappointing job growth and stagnant incomes for the majority of workers
have left the nation shaken and frustrated. At the same time, astonishing new
technologies—ranging from advanced robotics and “3-D printing” to the “digitization of
everything”—are provoking genuine excitement even as they make it hard to see where
things are going. Hence this paper: At a critical moment, this report asserts the
special importance to America’s future of what the paper calls America’s
“advanced industries” sector. Characterized by its deep involvement with
technology research and development (R&D) and STEM (science,
technology, engineering, and math) workers, the sector encompasses 50
industries ranging from manufacturing industries such as automaking and
aerospace to energy industries such as oil and gas extraction to high-tech services such
as computer software and computer system design, including for health applications.
These industries encompass the nation’s “tech” sector at its broadest and
most consequential. Their dynamism is going to be a central component of
any future revitalized U.S. economy. As such, these industries encompass the
country’s best shot at supporting innovative, inclusive, and sustainable
growth. For that reason, this report provides a wide-angle overview of the advanced
industry sector that reviews its role in American prosperity, assesses key trends, and
maps its metropolitan and global competitive standing before outlining high-level
strategies to enhance that. The overview finds that: 1. Advanced industries
represent a sizable economic anchor for the U.S. economy and have led the
post-recession employment recovery. Modest in size, the sector packs a
massive economic punch. As an employer and source of economic activity the
advanced industry sector plays a major role in the U.S. economy. As of 2013, the
nation’s 50 advanced industries (see nearby box for selection criteria) employed
12.3 million U.S. workers. That amounts to about 9 percent of total U.S.
employment. And yet, even with this modest employment base, U.S. advanced
industries produce $2.7 trillion in value added annually—17 percent of all
U.S. gross domestic product (GDP). That is more than any other sector,
including healthcare, finance, or real estate. At the same time, the sector employs
80 percent of the nation’s engineers; performs 90 percent of private-sector
R&D; generates approximately 85 percent of all U.S. patents; and accounts
for 60 percent of U.S. exports. Advanced industries also support unusually
extensive supply chains and other forms of ancillary economic activity. On a per
worker basis, advanced industries purchase $236,000 in goods and services
from other businesses annually, compared with $67,000 in purchasing by other
industries. This spending sustains and creates more jobs. In fact, 2.2 jobs are created
domestically for every new advanced industry job—0.8 locally and 1.4 outside of the
region. This means that in addition to the 12.3 million workers employed by
advanced industries, another 27.1 million U.S. workers owe their jobs to
economic activity supported by advanced industries. Directly and indirectly,
then, the sector supports almost 39 million jobs—nearly one-fourth of all U.S.
employment.
The US economy is driving global economy, a slowdown in the us
would mean a slowdown around the world
Bloomberg January 9, 2015. “U.S. Retakes the Helm of the Global Economy” Rich
Miller. http://www.bloomberg.com/news/articles/2015-01-09/u-s-retakes-the-helmof-the-global-economy//JJ
(Bloomberg) -- The U.S. is back in the driver’s seat of the global economy after
15 years of watching China and emerging markets take the lead. The world’s biggest
economy will expand by 3.2 percent or more this year, its best performance
since at least 2005, as an improving job market leads to stepped-up consumer
spending, according to economists at JPMorgan Chase & Co., Deutsche Bank AG and
BNP Paribas SA. That outcome would be about what each foresees for the
world economy as a whole and would be the first time since 1999 that
America hasn’t lagged behind global growth, based on data from the
International Monetary Fund. “The U.S. is again the engine of global
growth,” said Allen Sinai, chief executive officer of Decision Economics in New York.
“The economy is looking stellar and is in its best shape since the 1990s.” In the latest
sign of America’s resurgence, the Labor Department reported on Jan. 9 that payrolls
rose 252,000 in December as the unemployment rate dropped to 5.6 percent, its lowest
level since June 2008. Job growth last month was highlighted by the biggest gain in
construction employment in almost a year. Factories, health-care providers and
business services also kept adding to their payrolls. About 3 million more Americans
found work in 2014, the most in 15 years and a sign companies are optimistic
U.S. demand will persist even as overseas markets struggle. U.S. government
securities rose after the report as investors focused on a surprise drop in hourly wages
last month. Ten-year Treasury yields declined seven basis points to 1.95 percent at 5
p.m. in New York on Jan. 9. “We are still waiting to see the kind of strengthening of
wage numbers we would expect to be consistent with what we are seeing elsewhere in
terms of growth and the absolute jobs numbers,” Federal Reserve Bank of Atlanta
President Dennis Lockhart said in a Jan. 9 interview. Breaking Away The U.S. is
breaking away from the rest of the world partly because it has had more success working
off the debt-driven excesses that helped precipitate the worst recession since the Great
Depression. “The progress has been far greater in the U.S.,” Glenn Hubbard, dean of the
Columbia Business School in New York and a former chief White House economist, told
the American Economic Association annual conference in Boston on Jan. 3.
Delinquencies on consumer installment loans fell to a record-low 1.51 percent in the
third quarter, the American Bankers Association said on Jan. 8. That’s “well under” the
15-year average of 2.3 percent on such loans, which include credit cards and borrowing
for car purchases and home improvements, it said. U.S. households have benefited from
the strengthening job market and the collapse in oil prices. The nationwide average cost
of a gallon of regular gasoline was $2.13 on Jan. 11, the cheapest since May 2009,
according to figures from motoring group AAA. Wage Gains While wage gains have
lagged -- average hourly earnings fell 0.2 percent last month from November -- they will
accelerate as the labor market continues to tighten, according to Mohamed El-Erian, a
Bloomberg View columnist and an adviser to Munich-based Allianz SE. “It’s just a
matter of time before wage growth picks up,” he told Bloomberg Television’s “In The
Loop” program on Jan. 9. Spending is already strengthening. Households splurged on
new cars, appliances, televisions and clothing as spending climbed 0.6 percent in
November, double the gain in October, according to figures from the Commerce
Department in Washington. Light-vehicle sales totaled 16.5 million in 2014, the most
since 2006. “The economy picked up a nice tailwind at the end of the year,” Bill Fay,
group vice president for Toyota Motor Corp.’s U.S. sales arm, said on a Jan. 5
conference call. “This strength will carry the auto industry to a sixth straight year of
growth in 2015 with analyst projections ranging as high as 17 million.” Consumer
Spending At $11.5 trillion in 2013, U.S. personal consumption expenditures
were larger than the gross domestic product of any other country that year,
including China, according to statistics from the IMF in Washington. The figures aren’t
adjusted to reflect price discrepancies for the same goods in different nations -- so-
called purchasing power parity -- which tends to inflate the output of developing nations
where consumers pay less for everything from haircuts to coffee. Deutsche Bank
economists led by David Folkerts-Landau in London forecast U.S. GDP will expand 3.7
percent this year, after climbing 2.5 percent in 2014. The U.S. will contribute close
to 18 percent to global growth of 3.6 percent in 2015, compared with 11 percent for
all other industrial countries combined, they wrote in a Jan. 9 report. While the U.S.
is gathering strength, the BRIC nations -- Brazil, Russia, India and China -are facing tougher times after spending much of the past 15 years basking in the
attention of global investors. BRICs Faltering Brazil’s debt was downgraded last year for
the first time in a decade while Russia is heading into recession, its economy pummeled
by the collapse of oil prices and U.S. and European sanctions. Growth in China and
India has slowed as both countries grapple with revamping their
economies. “Close the book on emerging markets driving global growth,” Nancy Lazar,
co-founder and a partner at Cornerstone Macro LP in New York, wrote in a Jan. 8 report
to clients. Even Jim O’Neill, the former Goldman Sachs Group Inc. chief economist who
coined the BRIC acronym, has soured on some of its members, saying in an e-mail that
he would be tempted to remove Brazil and Russia from the group if they fail to revive
their flagging economies. “It is tough for the BRIC countries to all repeat their
remarkable growth rates” of the first decade of this century, said O’Neill, a
Bloomberg View columnist and former chairman of Goldman Sachs Asset Management
International.
Economic growth is key to prevent U.S-China Conflict
HSU 11-[“Economic Ties Could Help Prevent US-China War” Jeremy Hsu, Innovation
NewsDaily Senior Writer; 01 November 2011 05:32 PM ET;
http://www.innovationnewsdaily.com/660-china-military-cyber-nationalsecurity.html]
As the U.S. faces China's economic and military rise, it also holds a
dwindling hand of cards to play in the unlikely case of open conflict.
Cyberattacks aimed at computer networks, targeted disabling of satellites
or economic warfare could end up bringing down both of the frenemies.
That means ensuring the U.S. economy remains strong and well-balanced,
with China's economy possibly representing the best deterrent, according to a
new report. The Rand Corporation's analysts put low odds on a China-U.S. military
conflict taking place, but still lay out danger scenarios where the U.S. and China
face greater risks of stumbling into an unwanted war with one another.
They point to the economic codependence of both countries as the best bet
against open conflict, similar to how nuclear weapons ensured mutually assured
destruction for the U.S. and Soviet Union during the Cold War. War Militaria Collectors
www.JCAmericana.comWe Buy War Artifacts & Militaria Free Appraisals for
AuthenticityLearn German in 10 Days PimsleurApproach.com/Learn-GermanWorldfamous Pimsleur Method. As seen on PBS - $9.95 w/ Free S&H.VA Home Loan for
Veterans www.VAMortgageCenter.comGet a Quote in 2 Minutes! VA Loans now Up to
$729,000 with $0 Down. Ads by Google "It is often said that a strong economy is the
basis of a strong defense," the Rand report says. "In the case of China, a strong U.S.
economy is not just the basis for a strong defense, it is itself perhaps the
best defense against an adventurous China." Such "mutually assured
economic destruction" would devastate both the U.S. and China, given how
China represents America's main creditor and manufacturer. The economic
fallout could lead to a global recession worse than that caused by the
financial crisis of 2008-2009. The U.S. still spends more than five times on defense
compared with China, but Rand analysts suggest that China's defense budget could
outstrip that of the U.S. within the next 20 years. The U.S. Air Force and Navy's current
edge in the Pacific has also begun to shrink as China develops aircraft, ships,
submarines and missiles capable of striking farther out from its coast. Existing U.S.
advantages in cyberwar and anti-satellite capabilities also don't offset the fact that the
U.S. military depends far more heavily on computer networks and satellites than China's
military. That makes a full-out cyberwar or satellite attacks too risky for the U.S., but
perhaps also for China. "There are no lives lost — just extensive harm, heightened
antagonism, and loss of confidence in network security," Rand analysts say. "There
would be no 'winner.'" Open military conflict between China and the U.S. could
also have "historically unparalleled" economic consequences even if neither
country actively engages in economic warfare, Rand analysts say. The U.S.
could both boost direct defense in the unlikely case of war and reduce the
risk of escalation by strengthening China's neighbors. Such neighbors,
including India, South Korea, Japan and Taiwan, also represent possible
flashpoints for China-U.S. conflict in the scenarios laid out by the Rand
report. Other possible danger zones include the South China Sea, where
China and many neighboring countries have disputes over territorial
claims, as well as in the murkier realm of cyberspace. Understandably, China
has shown fears of being encircled by semi-hostile U.S. allies. That's why Rand analysts
urged the U.S. to make China a partner rather than rival for maintaining international
security. They also pointed out, encouragingly, that China has mostly taken "cautious
and pragmatic" policies as an emerging world power. "As China becomes a true
peer competitor, it also becomes potentially a stronger partner in the
defense as well as economic field," the Rand analysts say.
Nuclear war causes extinction
Robock 11 [Alan – Prof Environmental Science @ Rutgers. “Nuclear Winter is a Real
and Present Danger” Nature, Vol 473. Summer 2011 Ebsco]
In the 1980s, discussion and debate about the possibility of a ‘nuclear winter’ helped to end the arms race between the United States
and the Soviet Union. As former Soviet president Mikhail Gorbachev said in an interview in 2000: “Models made by Russian and
American scientists showed that a
nuclear war would result in a nuclear winter that
would be extremely destructive to all life on Earth; the knowledge of that was a great stimulus
to us, to people of honour and morality, to act.” As a result, the number of nuclear weapons in the world started to fall, from a peak
of about 70,000 in the 1980s to a total of about 22,000 today. In another five years that number could go as low as 5,000, thanks to
the New Strategic Arms Reduction Treaty (New START) between the United States and Russia, signed on 8 April 2010. Yet the
environmental threat of nuclear war has not gone away. The world faces the
prospect of a smaller, but still catastrophic, nuclear conflict. There are now
nine nuclear-weapons states. Use of a fraction of the global nuclear arsenal
by anyone, from the superpowers to India versus Pakistan, still presents the
largest potential environmental danger to the planet by humans. That
threat is being ignored. One reason for this denial is that the prospect of a
nuclear war is so horrific on so many levels that most people simply look
away. Two further reasons are myths that persist among the general public: that the nuclear
winter theory has been disproved, and that nuclear winter is no longer a
threat. These myths need to be debunked. The term ‘nuclear winter’, coined by Carl Sagan and his
colleagues in a 1983 paper1 in Science, describes the dramatic effects on the climate caused by smoke from fires ignited by nuclear
attacks on cities and industrial areas. In the 1980s my colleagues and I calculated, using
the best climate
models available at the time, that if one-third of the existing arsenal was used,
there would be so much smoke that surface temperatures would plummet
below freezing around the world for months, killing virtually all plants and
producing worldwide famine. More people could die in China from starvation than in the nations actively
bombing each other. As many countries around the world realized that a superpower nuclear war would be a disaster for them, they
pressured the superpowers to end their arms race. Sagan did a good job of summarizing the policy impacts2 in 1984: although
weapons were continuing to be built, it would be suicide to use them. The idea of climatic catastrophe was fought against by those
who wanted to keep the nuclear-weapon industry alive, or who supported the growth of nuclear arsenals politically3.
Scientifically, there was no real debate about the concept, only about the
details. In 1986, atmospheric researchers Starley Thompson and Stephen Schneider wrote a piece in Foreign Affairs appraising
the theory4 and highlighting what they saw as the patchiness of the effect. They coined the term ‘nuclear autumn’, noting that it
wouldn’t be ‘winter’ everywhere in the aftermath of a nuclear attack. They didn’t mean for people to think that it would be all raking
leaves and football games, but many members of the public, and some pro-nuclear advocates, preferred to take it that way. The fight
over the details of the modelling caused a rift between Sagan and Schneider that never healed. When I bring up the topic of nuclear
winter, people invariably tell me that they think the theory has been disproved. But research continues to support the original
concept. By
2007, models had began to approximate a realistic atmosphere up
to 80 kilometres above Earth’s surface, including the stratosphere and
mesosphere. This enabled me, and my coauthors, to calculate for the first time that
smoke particles would be heated by the Sun and lifted into the upper
stratosphere, where they would stay for many years5,6. So the cooling would
last for much longer than we originally thought. DARK DAYS Many of those who
do accept the nuclear-winter concept think that the scenario applies only to
a mass conflict, on a scale no longer conceivable in the modern world. This
is also false. A ‘small’ nuclear war between India and Pakistan, with each
using 50 Hiroshima-size bombs (far less than 1% of the current arsenal), if
dropped on megacity targets in each country would produce climate change
unprecedented in recorded human history 5. Five million tonnes of black
carbon smoke would be emitted into the upper troposphere from the burning cities, and
then be lofted into the stratosphere by the heat of the Sun. Temperatures would be lower than during
the ‘Little Ice Age’ (1400–1850), during which famine killed millions. For several years, growing seasons would be
shortened by weeks in the mid-latitudes (see ‘A decade of cooling). Brian Toon at the University of Colorado in Boulder, Richard
Turco at the University of California, Los Angeles, Georgiy Stenchikov at Rutgers University in New Brunswick, New Jersey, and I,
all of whom were pioneers in nuclear-winter research in the 1980s, have tried, along with our students, to publicize our results. We
have published refereed journal articles, popular pieces in Physics Today and Scientific American, a policy forum in Science, and
now this article. But Foreign Affairs and Foreign Policy, perhaps the two most prominent foreign-policy magazines in English, would
not even review articles we submitted. We have had no luck getting attention from the US government. Toon and I visited the US
Congress and gave briefings to congressional staff on the subject two years ago, but nothing happened as a result. The US President’s
science adviser John Holdren has not responded to our requests — in 2009 and more recently — for consideration of new scientific
results in US nuclear policy. The only interest at a national level I have had was somewhat surreal: in September 2010, Fidel Castro
summoned me to a conference on nuclear winter in Havana, to help promote his new view that a
nuclear conflict
would bring about Armageddon. The next day, my talk — the entire 90 minutes including questions — was
broadcast on nationwide television in prime time, and appeared on the front page of the two national newspapers in Cuba. As in the
1980s, it is still too difficult for most people to fully grasp the consequences of a nuclear conflict. But it must be grasped. We
scientists must continue to push our results out to the public and to policymakers, so they can in turn push political will in the
direction of disarmament. Just as Gorbachev, armed with the knowledge of nuclear winter, helped to end the cold war, so too can the
politicians of today use science to support further reductions in arms. The New START treaty is not enough.
XTN
1) Overreach has killed USA company competitiveness that’s
Forbes 13
2) USA econ key to advancing global econ that’s Bloomberg
3) Econ growth prevents China miscalc which causes extinction,
that’s Robock 11
IF NEEDED:
NSA surveillence has hampered the tech industry and is driving
companies away and increasing data localization
Dou 6/17/15 (Eva Dou. June 17, 2015. The Wall Street Journal. Wsj.com “Cisco Unveils
$10 Billion China Plan” [http://www.wsj.com/articles/cisco-unveils-10-billion-chinaplan-1434540957])
BEIJING— Cisco
Systems Inc. said it will make investments and partnerships
worth more than $10 billion in China over the next several years, as the networkinggear maker looks to strengthen its position in the market amid geopolitical
headwinds. WSJ.D WSJ.D is the Journal’s home for tech news, analysis and product reviews. FCC Plans to Fine A&T $100
Million Over Speed Caps Uber Driver Was an Employee, California Commission Says Former Nokia CEO Stephen Elop Is Leaving
Microsoft Cisco unveiled the plan on Wednesday, after outgoing Chief Executive John Chambers and his replacement Chuck
Robbins met with Chinese Vice Premier Wang Yang and other government leaders in Beijing. In its statement, Cisco
didn’t
outline specific investments or other targets, such as a time frame. Cisco
also said it signed a memorandum of understanding with China’s top
economic-planning body, the National Development and Reform Commission, to invest in areas
that will help the country achieve its long-term goal of innovation-driven
development. “Cisco is deeply committed to our Chinese partners,” said Mr.
Robbins in the statement. Cisco and other U.S. technology suppliers face a challenging
business environment in China after former U.S. National Security Agency
contractor Edward Snowden alleged the NSA used U.S. technology products
to help it spy overseas. China has upped its use of domestic technology in
response and is drafting stricter technology security rules to govern foreign
suppliers. Cisco has said it had no knowledge of any NSA spying activities. The announcement also comes amid broader
strategic changes at Cisco due to the change of CEO, which is set to take place next month. Mr. Robbins has flattened the global
executive structure, and the company said internally last week that several Chinese senior executive positions would be removed.
Mr. Chambers will become executive chairman. Cisco’s China sales fell 20% in the quarter ended April 25 from a year earlier.
Several other U.S. tech companies have announced large China investments
in the past year. Qualcomm Inc. said in July last year it would invest up to $150 million in Chinese startups. Intel Corp.
said in September it bought about 20% of Tsinghua Unigroup Ltd., which owned the China’s second- and third-largest chip-design
firms, for $1.5 billion.
Past NSA spying techniques has threatened relations with US allies
John Vidal and Suzanne Goldenberg 14 (January 30, 2014. TheGaurdian.com
“Snowden revelations of NSA spying on Copenhagen climate talks spark anger”
[http://www.theguardian.com/environment/2014/jan/30/snowden-nsa-spyingcopenhagen-climate-talks])
Developing countries have reacted angrily to revelations that the United
States spied on other governments at the Copenhagen climate summit in
2009. Documents leaked by Edward Snowden show how the US National Security Agency (NSA)
monitored communication between key countries before and during the
conference to give their negotiators advance information about other
positions at the high-profile meeting where world leaders including Barack Obama, Gordon Brown and Angela
Merkel failed to agree to a strong deal on climate change. Jairam Ramesh, the then
Indian environment minister and a key player in the talks that involved 192 countries and 110 heads of state, s aid: "Why
the hell did they do this and at the end of this, what did they get out of
Copenhagen? They got some outcome but certainly not the outcome they
wanted. It was completely silly of them. First of all, they didn't get what they
wanted. With all their hi-tech gizmos and all their snooping, ultimately the
Basic countries [Brazil, South Africa, India and China] bailed Obama out.
With all their snooping what did they get?" Martin Khor, an adviser to developing
countries at the summit and director of the South Centre thinktank, said: "Would you play poker with
someone who can see your cards? Spying on one another like this is
absolutely not on. When someone has an upper hand is very disconcerting.
There should be an assurance in negotiations like this that powerful players
are not going to gain undue advantage with technological surveillance. "For
negotiations as complex as these we need maximum goodwill and trust. It is absolutely
critical. If there is anything that prevents a level playing field, that stops
negotiations being held on equal grounds. It disrupts the talks," he said. The NSA
would keep US negotiators abreast of their rivals' positions, the document says. "Leaders and negotiating teams from around the
world will undoubtedly be engaging in intense last-minute policy formulating; at the same time, they will be holding sidebar
discussions with their counterparts, details of which are of great interest to our policymakers … Signals intelligence will undoubtedly
play a significant role in keeping our negotiators as well informed as possible throughout the negotiations," it reads. The
document shows the NSA had provided advance details of the Danish plan
to "rescue" the talks should they founder, and also had learned of China's efforts to
coordinate its position with India before the conference. The talks – which ended
in disarray after the US, working with a small group of 25 countries, tried to ram through an agreement that other developing
countries mostly rejected – were marked by subterfuge, passion and chaos. Members of the
Danish negotiating team told the Danish newspaper Informationthat both the US and Chinese delegations were "peculiarly wellinformed" about closed-door discussions. "They simply sat back, just as we had feared they would if they knew about our document,"
one source told Information. British negotiators at the summit declined to say whether their negotiating positions had been
informed by US intelligence. "It is a longstanding policy that we do not comment on intelligence matters," said a spokesman for the
Department of Energy and Climate Change, the UK government department that led the negotiations in Copenhagen. Ed Miliband,
who as energy secretary led the political negotiations for Britain, declined to comment. However, at the time, he was furious that the
Danish text which the US had received advance information about, had been leaked to the Guardian. But one key
negotiator for the G77 group of 132 developing countries, who asked not to be named, said at the time
that he strongly believed
that the US was eavesdropping on his meetings and
would only talk in a secure back room that he thought was not bugged. "I was well aware that they
seemed to know what our position was before we did," he told the Guardian. But Ramesh said that he had no idea that the US was
spying on him. "I didn't get a sense that I was being followed. I didn't get a sense that my phones were tapped," he said. Civil
society groups from around the world condemned the US. "The UN climate
talks are supposed to be about building trust – that's been under threat for years because of the US
backward position on climate action – these revelations will only crack that trust further," said
Meena Raman, negotiations expert from the Malaysian-based Third World Network. "Fighting climate change is
a global struggle, and these revelations clearly show that the US government
is more interested in crassly protecting a few vested interests," said Brandon Wu,
senior policy analyst with development organisation ActionAid in the United States. US climate activist and founder of 350.org,
Bill McKibben, called the spying revelations "insane and disgusting". US
diplomatic cables made public by WikiLeaks in 2010 showed that the CIA had sought intelligence from UN diplomats about the
negotiations in advance of the summit, and Snowden documents published last year revealed the US had spied on Indonesia at the
Bali climate summit in 2007
Due to concerns about the NSA, American companies are losing
billions
New York Times. March 21. 2014. “Revelations by Snowden damage U.S. tech
industry: Worried about privacy, foreign clients start to take business elsewhere”.
CLAIRE CAIN MILLER. /JJ
Technology companies abroad say they are gaining customers who are
shunning United States companies because of security concerns. Microsoft
has lost customers, including the government of Brazil. IBM is spending more than a
billion dollars to build data centers overseas in order to reassure foreign customers that
their information is safe from prying eyes in the United States government. And
technology companies abroad say they are gaining customers who are
shunning United States companies, suspicious because of the revelations by
Edward J. Snowden of the National Security Agency's vast surveillance
program. Even as Washington grapples with the diplomatic and political
fallout of Mr. Snowden's leaks, the more urgent issue, companies and
analysts say, is economic. It is impossible to see now the full economic ramifications
of the spying revelations -- in part because most companies are locked in multiyear
contracts -- but the pieces are beginning to add up as businesses question the
trustworthiness of American technology products. Meanwhile, the confirmation hearing
last week for the new N.S.A. chief, the appearance by video link of Mr. Snowden at a
technology conference in Texas and the drip of new details about government spying
have kept attention focused on an issue that many technology executives had hoped
would go away. "It's clear to every single tech company that this is affecting
their bottom line," said Daniel Castro, a senior analyst at the Information
Technology and Innovation Foundation, who predicted that the United States
cloud computing industry could lose $35 billion by 2016. Forrester, a
technology research firm, said the losses could be as high as $180 billion, or 25
percent of industry revenue, based on the size of the cloud computing, web hosting
and outsourcing markets and the worst-case scenario for damages. The business effect
of the Snowden revelations is felt most in the daily conversations between technology
companies with products to pitch and their wary customers. The topic of surveillance,
which rarely came up before, is "the new normal" in these conversations, as one
technology company executive described it. "We're hearing from customers, especially
global enterprise customers, that they care more than ever about where their content is
stored and how it is used and secured," said John Frank, deputy general counsel at
Microsoft, which has been publicizing that it allows customers to store their data in
Microsoft data centers in their own countries. At the same time, Mr. Castro said,
companies feel the United States government is only making a bad situation worse.
"Most of the companies in this space are very frustrated because there
hasn't been any kind of response that's made it so they can go back to their
customers and say, 'See, this is what's different now, you can trust us
again,"' he said. In some cases, that has meant forgoing potential revenue. Though it is
hard to quantify missed opportunities, American businesses are being left off some
requests for proposals from foreign customers who previously would have included
them, said James Staten, a cloud computing analyst at Forrester who has read clients'
requests for proposals. There are German companies, Mr. Staten said, "explicitly not
inviting certain American companies to join." He added, "It's like, 'Well, the very best
vendor to do this is IBM, and you didn't invite them."' The result has been a boon for
foreign companies. Brazil and Europe, which had used American undersea cables for
intercontinental communication, decided last month to build their own cable between
Brazil and Portugal and gave the contract to Brazilian and Spanish companies. The
Brazilian government also abandoned Microsoft Outlook for its own email system,
which uses Brazilian data centers. Runbox, a Norwegian email service that
markets itself as an alternative to American services like Gmail and says it
does not comply with foreign court orders seeking personal information,
reported a 34 percent annual rise in customers after the N.S.A. revelations.
Large European telecommunications companies like Deutsche Telekom of Germany
have introduced services like an email product that keeps users' data inside Germany in
direct response to customers' concerns about the N.S.A. scandal. Others like Orange of
France have seen an increase in business customers asking about privacy when
discussing potential cloud computing contracts. While the company's 15 data centers in
Europe, which has stronger data protection laws than the United States, are a major
selling point, Orange says it still has to provide services that compete with what
American rivals can offer. "The Snowden story is putting the pendulum between
European and American companies back into the middle," said Axel Haentjens, vice
president of cloud computing at Orange. "Before, the pendulum favored the
Americans. The competitive advantage is now more balanced." Mark J.
Barrenechea, chief executive of OpenText, Canada's largest software company, said an
anti-American attitude took root after the passage of the Patriot Act. But "the volume of
the discussion has risen significantly post-Snowden," he said. Of OpenText's clients, for
instance, a large German auto company required data to reside in Germany,
and a global steel manufacturer based in Britain demanded that its data not
cross United States borders. "Issues like privacy are more important than
finding the cheapest price," said Matthias Kunisch, a German software executive
who spurned United States cloud computing providers for Deutsche Telekom. "Because
of Snowden, our customers have the perception that American companies have
connections to the N.S.A." Security analysts say that ultimately the fallout from Mr.
Snowden's revelations could mimic what happened to Huawei, the Chinese
software company, which was forced to abandon major acquisitions and
contracts amid accusations by American lawmakers that the company's
products contained a backdoor for China's People's Liberation Army, even
though this claim was never definitively verified. Silicon Valley companies have
complained to government officials that their actions are hurting business. But
companies clam up on specifics about economic harm, whether to avoid frightening
shareholders or because it is too early to produce concrete evidence. "The companies
need to keep the priority on the government to do something about it, but they don't
have the evidence to go to the government and say billions of dollars are not coming to
this country," Mr. Staten said. Some American companies say the business hit has been
minor at most. John Chambers, the chief executive of Cisco Systems, said in an
interview that the N.S.A. disclosures had not affected Cisco's sales "in a major way."
Although deals in Europe and Asia have been slower to close, he said, they are still being
completed -- an experience echoed by several other computing companies. Still, the
business blowback can be felt in other ways than lost business. Security analysts say
technology companies have collectively spent millions and possibly billions
of dollars adding state-of-the-art encryption features to consumer services,
like Google search and Microsoft Outlook, and to the cables that link data
centers at Google, Yahoo and other companies. IBM said in January that it
would spend $1.2 billion to build 15 new data centers, including centers in London,
Hong Kong and Sydney, Australia, to lure foreign customers who are sensitive about the
location of their data. Salesforce.com announced similar plans this month.
Meanwhile, lawmakers in Germany and Brazil are considering legislation
that would make it costly or even technically impossible for American
technology companies to operate inside their borders. In Brazil, for example, a
proposed law would require that Brazilian users' data be kept in data centers in the
country. If it passes, companies like Google "could be barred from doing
business in one of the world's most significant markets," said Richard Salgado,
director of law enforcement and information security at Google. The company has said it
is technically nearly impossible to provide its services without sending data crisscrossing
the globe. Some government officials say laws like this could have a motive other than
protecting privacy. "Localization of data means more business for local
companies," Richard Clarke, the former United States cyberchief, said last month.
AT No war:
Yes War
Pillsbury 14 (Michael Pillsbury is a director of the Center on Chinese Strategy at the
Hudson Institute. “China and the United States Are Preparing For War”. Foreign Policy. November
13, 2014. http://foreignpolicy.com/2014/11/13/china -and-the-united-states-are-preparing-forwar/).
Should we really be worried about war between the United States and China? Yes.
Over the last four decades of studying China, I have spoken with hundreds of
members of China’s military, the People’s Liberation Army (PLA), and read
countless Chinese military journals and strategy articles. Chinese military and
political leaders believe that their country is at the center of American war
planning. In other words, Beijing believes that the United States is readying itself
for the possibility of a conflict with China — and that it must prepare for that
eventuality.
Pakistan
The perception of the NSA spying on Pakistan has increased
resentment and distrust
Economic Times. ’14. (“Pakistan People's Party condemns snooping by National
Security Agency”
PTI Jul 3, 2014. http://articles.economictimes.indiatimes.com/2014-0703/news/51057439_1_party-condemns-internal-affairs-pakistan-people )//AF
ISLAMABAD: Pakistan People's Party on Wednesday condemned as totally
unacceptable the US National Security Agency's snooping over it and asked the
government to take up the issue at diplomatic level. According to media reports the
declassified documents show that Pakistan People's Party (PPP) was under
scanner of the US secret agency. PPP spokesman Farhatullah Babar
condemned it and called upon the government to take up the issue at
diplomatic level and seek guarantees that such grave violations of
international law do not take place in the future. "The revelation of spying on a
major political party of Pakistan is a grave, unwarranted and totally unacceptable
interference in the internal affairs of a sovereign country and is condemned," the
spokesperson said. Babar said that PPP is proud of its record of always acting in
supreme national interest, it owes no explanation to any foreign agency and no other
country, regardless of its might and power, has any right to spy on it. "Such
insensitive operations and unacceptable interference in the affairs of a political
party of a sovereign country will serve no purpose except to increase
resentment and distrust," he said. He said that those who have violated the norms of
responsible behavior by spying on the political institutions of a sovereign country owe
an apology. PPP is the main opposition party and is considered as major
democratic force in Pakistan.’
Trust is needed in order to negotiate a nuclear agreement with
Pakistan
Williams 14. (“Trust and Distrust in the Global Nuclear Community” Heather
Williams. Nuclear Specialist at Chatham House. 2014.
http://www.chathamhouse.org/expert/comment/16475# )//JJ
On 8-9 December the Austrian Ministry of Foreign Affairs hosted a conference, the
third of its kind, on the humanitarian impacts of nuclear weapons, which was
attended by nearly 160 states. The conference differed from its predecessors in being
more politically charged but it continued to ask paradigmatic and practical questions of
the global nuclear order. In closing, Austria offered a comprehensive pledge to
share the findings of the conference and to work with all relevant
stakeholders ‘in efforts to stigmatize, prohibit and eliminate nuclear
weapons in light of their unacceptable humanitarian consequences and
associated risks.’ Nuclear weapons are back on the agenda with North Korean
belligerence, the Iran nuclear talks, and the crisis with Russia and concerns about its
compliance with arms control agreements. There have also been changes in the nuclear
discourse, largely due to the humanitarian impacts of nuclear weapons initiative,
launched in 2012. With around 160 participants, the Vienna Conference was bigger than
its predecessors (128 states attended the 2013 conference in Oslo, Norway and 146
attended Nayarit, Mexico in 2014) and there was a greater diversity of views. The United
States and United Kingdom joined this conference for the first time, along with an
unofficial representative from China. Perhaps the biggest difference between Vienna
and its predecessors, however, was that the conference dealt more directly with strategic
and political issues. The Oslo and Nayarit conferences avoided debates over deterrence
and geopolitical balancing, aside from occasional comments about regional security
concerns. At the talks in Vienna, numerous countries used the diplomatic opportunity to
express opposition to Russian aggression. In particular, Ukraine made a statement
about Russian ‘military dominance’ and its capability and desire to demonstrate nuclear
superiority over NATO and the US. In addition, while the Nuclear Non-Proliferation
Treaty (NPT) was mentioned in previous conferences, it was at the forefront in Vienna
in the lead-up to the NPT Review Conference in May 2015. Expectations are low for the
Review Conference, but many states, such as Germany, referred to the ’joint interest’ in
strengthening and sustaining the NPT. Hopefully, this effort and focus will
broaden to include India and Pakistan, which have participated in all the
conferences, as well as Israel and North Korea. In addition, the statements by the US
and UK and their presence in Vienna demonstrated that countries with nuclear
deterrence policies are willing to participate in a humanitarian approach. The
permanent five members of the UN Security Council (P5) previously accused the
humanitarian impacts approach of being a ‘distraction’ from the step-by-step process
towards disarmament and of risking undermining the NPT. At the Vienna Conference,
four questions and themes emerged for the global nuclear order, as it evolves in
response to the Iran talks, a resurgent Russia, and pressure from non-nuclear weapon
states (NNWS) for further progress on disarmament. First, is there an acceptable level
of risk in living with nuclear weapons? According to the chair’s summary, the risks of
nuclear weapons are ‘unacceptable’ and ‘increase over time’ and ‘limiting nuclear
weapons to a deterrence role does not eliminate the risk of their use.’ With
the end of the Cold War, nuclear weapons shifted from the forefront to the
back-burner of political and public thought. As a result, much of the
expertise on the
from national security and created a situation where they really exist on their own, and
then slowly they can be—as is suggested in (inaudible) from the joint enterprise. And
that's really not the case in South Asia. They're very much part, particularly for Pakistan,
but to some extent, for India vis-a-vie its relationship with China. They're very much a
part of the national security calculus and very much part of how we might face a future
crisis and the signaling and the posturing that goes on in that part of the world. So
you're quite right to identify it as the sort of—the major sticking point. I think that, as
we've said about the other regions, it's a long, slow process of building
confidence between the two, of putting in place measures which will reduce
the danger of accidental use, and also push back the moment when use
might happen if there is a conventional conflict and a sort of broader approach
to dealing with the risks associated with nuclear weapons has stagnated.
These risks include accidents, miscalculation, and the escalation of crises in
regions where nuclear weapons are present. The Vienna meeting captured the
scale of the risks and the increasing worries about the cyber vulnerabilities of nuclear
forces. Second, the humanitarian impacts of nuclear testing were in the forefront at
Vienna with a panel of victims of nuclear testing in the Marshall Islands, Australia, and
the US and, later from the floor, a contribution from Kazakhstan. This theme offers a
way ahead for the initiative, particularly for the P5, along with India and
Pakistan, to acknowledge the humanitarian impacts of nuclear testing and
to promote the entry into force of the Comprehensive Test Ban Treaty,
building on the prohibition of nuclear testing in the atmosphere and underground.
Third, hearing the testimony of victims of nuclear bombings and testing has a deep
emotional impact, and raises awareness of the consequences of nuclear weapons
detonation with potential policy impact. Ethical and moral questions were both implicit
in hearing about children playing in the ‘snow’ in the Marshall Islands, and explicit with
a message from Pope Francis questioning the ethical framework of nuclear deterrence
and calling on us to stay true to the tenets of the peace and love in the human heart.
Fourth, ‘trust’ was a frequent theme in Vienna. India discussed the need to
increase trust on the path towards disarmament within the context of the
Conference on Disarmament. Activists, such as Michelle Thomas, a victim of US
nuclear testing, spoke of distrust towards their governments. And the UK stated that
trust, confidence, and verification measures are needed on the path to
disarmament in order to maintain strategic stability. Distrust seems
pervasive in the current global nuclear order, particularly the deteriorating
situation with Russia and lack of opportunities for further US-Russia arms control,
along with Russia’s announcement that it will not attend the 2016 Nuclear Security
Summit. This is compounded by the end of cooperation with the US to secure Russian
nuclear materials. What the Vienna Conference demonstrated, however, was that the
majority of countries understand what is at stake. They want to build trust and take
seriously their nuclear responsibilities, to move forward within the global nuclear
community.
Nuclear Tensions between India and Pakistan are
reaching a tipping point
Council on Foreign Relations April 24, 2015. “Assessing Global Nonproliferation
in 2015 Approaching the Tipping Point: Nuclear Nonproliferation in 2015” Speakers:
Peter Hayes Executive Director, Nautilus Institute for Security and Sustainability Peter
Jones Annenberg Distinguished Visiting Fellow, Hoover Institution; Associate
Professor, Graduate School of Public and International Affairs, University of Ottawa
Steven Pifer Director, Arms Control and Non-Proliferation Initiative, Brookings
Institution Presider: David C. Speedie Senior Fellow and Director of the U.S.
Engagement Program, Carnegie Council for Ethics in International Affairs.
http://www.cfr.org/proliferation/assessing-global-nonproliferation-2015/p36449)//JJ
The one region none of you have talked about—for obviously reasons, because you don't
specialize in it—but the one where a nuclear tipping point may come into play is South
Asia, where we are watching a Pakistani program that seems to know no bounds and is
threatening to, you know, get larger than Britain's. India responding, and that obviously
is going to raise problems in Beijing down the road. Would you talk about that a little?
JONES: You know, I actually do some Track II work in South Asia specifically on the
nuclear question. And you're quite right. I mean, it is area of the world that I lose sleep
over, much more so than Iran, for example. I think the most worrisome thing to
my mind about the nuclear dynamic in South Asia is Pakistan's decision to go
ahead and deploy, whether you call them theater, tactical, low yield, whatever they
call them nuclear weapons and to essentially couple them with its
conventional deterrent. The idea being that if India attacks, well, it's
probably in response to a terrorist provocation, the threshold for the use of
nuclear weapons will be much reduced. They will be near the front and they'll be
low yield. And of course, this is exactly what the Pakistanis are doing. And then they say
well, this is what NATO did during the cold war. It was the conventionally-inferior
alliance vis-a-vis the Soviety—the Warsaw Pact, and therefore— Of course, it's very
different. I mean, the Warsaw Pact, NATO was not sponsoring groups to go across the
borders of East Germany and blow things up. So it's a different situation. But
nevertheless, there is a real problem there, and I'm not sure that the NPT as such is
equipped to deal with it. Not just because these two countries aren't members. It's more
than that. It's because the fundamental logic of the NPT has been sort of over time decoupled nuclear weapons issues between India and Pakistan. But also in the cases of
South Asia, it's a trilateral problem. Because the Indians, they say their primary cause of
their nuclear expansion, or the nuclear expansion they could undertake if they chose to
do so, is China. And therefore, there's a need to bring them in, as well. It's really a
trilateral problem. PIFER: And this might be a case where the Pakistanis might pay
attention to the NATO experiences was as NATO began to reduce its tactical nuclear
weapons, the first things it got rid of were the atomic demolition munitions, the
artillery, the short-range stuff. Because they understood that in a conventional conflict,
the pressure to use or lose those would be so great that you might have nuclear use
which was not intended by higher-level command authorities. JONES: But I think the
Pakistani—they will tell you that that's exactly the point. They want to confront the
Indians with this problem. If you cross the line, you know, we'll both find
out what happens. Because we don't know either. So just don't cross the line. I
mean, that's the sort of—you know, and the Indians are saying well, if you're going to
sort of take that attitude but continue to sponsor terror groups, we can't promise not to
cross the line because that's the only way we can—so that whole dynamic. So it becomes
a broader political question of the future, Pakistan and—I mean, I think I do take a little
bit of heart from the fact that I go there quite frequently and I talk to people and work
with them in these Track II settings. There is a growing recognition in Pakistan that this
sponsorship of substate actors has come back to bite them. Quite seriously. Primarily,
their sponsorship of substate actors on their northern border with Afghanistan. They
still perhaps—or some people think of the substate actors on the southern border with
India as national assets. But even there, there's much more of a robust discussion about,
you know, can we really control these people and are they doing things that are not
congruent with our interests? I wouldn't say it's a decisive conversation yet; they're still
supporting these groups. But I think it's at least the beginning of a conversation that
there is this tail—a tiger that's biting. SPEEDIE: I think we need more cricket matches
within India and Pakistan. There's a confidence... JONES: They always ends peacefully,
yeah. SPEEDIE:—confidence-building measure, especially if they end in a draw.
HAYES: David, can I say this very quickly? SPEEDIE: Yes. HAYES: And I'll be very brief.
Basically, unless China is drawn into a nuclear weapons-free zone in Northeast Asia, it
will be that much more difficult in South Asia to resolve those issues that you just
referred to. But the reciprocal is also the case. I mean, the nuclear weapon-free zones
that exist, or the potential ones, now actually affect each other. And the U.N.'s position
on this is that we need to think about this as a global mosaic, not just as one separate
from the other. Because they do actually interplay quite importantly and can be
synergistic as well as possibly undermine each other in some respects. But it is an
important part of the issue. SPEEDIE: The gentleman next to Lee Siegel (ph).
QUESTION: Trevor Stewart (ph), Deloitte. I'd be interested in what the panel thinks
about are we reaching a different kind of tipping point potentially with non-state actors?
Thinking about Al-Qaeda, ISIS, you know, some rogue faction in Libya or whatever.
With all the amount of nuclear technology that's bouncing around, what's the—what's
the risk? SPEEDIE: Non-state actors. Who's the—who worries most about non-state
actors? We all do. PIFER: Well, I think that's actually the nightmare scenario in a sense
that, you know, deterrence at some level works between states because you have
something to hold at risk. If you're dealing with Al-Qaeda, what can you hold at risk?
And Al-Qaeda may be so committed to terrorism that, you know, they may not care in
the end. And the flip side is also true, is that, you know, how in a deterrence relationship
will you assure a group like Al-Qaeda, who knows we're coming at them as much as we
can, that if they didn't do certain things we might back off. The good news I think is that
acquiring nuclear materials is something that non-state actors can't do on their own.
They're going to have to either get it willingly or steal it from a state actor.
Heightened tensions between India and Pakistan could lead to
miscalculation and nuclear war
Council on Foreign Relations April 24, 2015. (The Nautilus Institute's Peter
Hayes, the Hoover Institution's Peter Jones, and the Brookings Institution's Steven Pifer
join David C. Speedie, senior fellow at the Carnegie Council for Ethics in International
Affairs, to discuss the state of nuclear nonproliferation in 2015.) “Assessing Global
Nonproliferation in 2015” CFR./JJ
The one region none of you have talked about—for obviously reasons, because you don't
specialize in it—but the one where a nuclear tipping point may come into play is South
Asia, where we are watching a Pakistani program that seems to know no bounds and is
threatening to, you know, get larger than Britain's. India responding, and that obviously
is going to raise problems in Beijing down the road. Would you talk about that a little?
JONES: You know, I actually do some Track II work in South Asia specifically on the
nuclear question. And you're quite right. I mean, it is area of the world that I lose sleep
over, much more so than Iran, for example. I think the most worrisome thing to my
mind about the nuclear dynamic in South Asia is Pakistan's decision to go ahead and
deploy, whether you call them theater, tactical, low yield, whatever they call them
nuclear weapons and to essentially couple them with its conventional deterrent. The
idea being that if India attacks, well, it's probably in response to a terrorist
provocation, the threshold for the use of nuclear weapons will be much
reduced. They will be near the front and they'll be low yield. And of course, this is
exactly what the Pakistanis are doing. And then they say well, this is what NATO did
during the cold war. It was the conventionally-inferior alliance vis-a-vis the Soviety—the
Warsaw Pact, and therefore— Of course, it's very different. I mean, the Warsaw Pact,
NATO was not sponsoring groups to go across the borders of East Germany and blow
things up. So it's a different situation. But nevertheless, there is a real problem there,
and I'm not sure that the NPT as such is equipped to deal with it. Not just because these
two countries aren't members. It's more than that. It's because the fundamental logic of
the NPT has been sort of over time de-coupled nuclear weapons from national security
and created a situation where they really exist on their own, and then slowly they can
be—as is suggested in (inaudible) from the joint enterprise. And that's really not the case
in South Asia. They're very much part, particularly for Pakistan, but to some
extent, for India vis-a-vie its relationship with China. They're very much a
part of the national security calculus and very much part of how we might
face a future crisis and the signaling and the posturing that goes on in that
part of the world. So you're quite right to identify it as the sort of—the major sticking
point. I think that, as we've said about the other regions, it's a long, slow
process of building confidence between the two, of putting in place
measures which will reduce the danger of accidental use, and also push back
the moment when use might happen if there is a conventional conflict and a sort of
broader approach to dealing with the issues between India and Pakistan. But also in the
cases of South Asia, it's a trilateral problem. Because the Indians, they say their
primary cause of their nuclear expansion, or the nuclear expansion they
could undertake if they chose to do so, is China. And therefore, there's a
need to bring them in, as well. It's really a trilateral problem. PIFER: And this
might be a case where the Pakistanis might pay attention to the NATO experiences was
as NATO began to reduce its tactical nuclear weapons, the first things it got rid of were
the atomic demolition munitions, the artillery, the short-range stuff. Because they
understood that in a conventional conflict, the pressure to use or lose those
would be so great that you might have nuclear use which was not intended
by higher-level command authorities. JONES: But I think the Pakistani—they will
tell you that that's exactly the point. They want to confront the Indians with this
problem. If you cross the line, you know, we'll both find out what happens. Because we
don't know either. So just don't cross the line. I mean, that's the sort of—you
know, and the Indians are saying well, if you're going to sort of take that
attitude but continue to sponsor terror groups, we can't promise not to
cross the line because that's the only way we can—so that whole dynamic. So
it becomes a broader political question of the future, Pakistan and—I mean, I think I do
take a little bit of heart from the fact that I go there quite frequently and I talk to people
and work with them in these Track II settings. There is a growing recognition in
Pakistan that this sponsorship of substate actors has come back to bite
them. Quite seriously. Primarily, their sponsorship of substate actors on their northern
border with Afghanistan. They still perhaps—or some people think of the substate actors
on the southern border with India as national assets. But even there, there's much more
of a robust discussion about, you know, can we really control these people and are they
doing things that are not congruent with our interests? I wouldn't say it's a decisive
conversation yet; they're still supporting these groups. But I think it's at least the
beginning of a conversation that there is this tail—a tiger that's biting.
XTN
The NSA has overstepped its bounds by purposefully spying on
members of the media
Stapp 12 May 2015. – Graduate of Columbia School of Journalism. Stapp, Kitty.
Global Information Network
http://search.proquest.com/docview/1680261159/C0A09E0AD8864900PQ/9?account
id=44751)//JJ
NEW YORK, May 12, 2015 (IPS/GIN) - Ahmad Muaffaq Zaidan doesn't deny that he's
had contact with terrorist groups. In fact, it would have been rather difficult to do his job
otherwise. But the fact that Zaidan is a respected investigative journalist and the
Islamabad bureau chief for Al Jazeera didn't seem to faze the U.S. National
Security Agency, which not only spied on him, but went as far as to brand him
a likely member of Al Qaeda and put him on a watch list. The revelations of
NSA spying emerged late last week as part of the thousands of classified documents
leaked by former NSA employee Edward Snowden. "Given that Pakistan has been
consistently ranked as one of the most dangerous countries for journalists, the news of
Zaidan's surveillance further adds to the fear, restricting press freedom,"
said Furhan Hussain, manager of the Digital Rights and Freedom of Expression
programme at Bytes for All, a Pakistani human rights group. "Equally alarming, in this
case, is the fact that by compromising the information of respected journalists, such
spying also weakens the safety of their sources and media networks," he told IPS.
"Zaidan's communications intercept took place through the invasive
gathering and analysis of his metadata, a technique which has been frequently
responsible for drone-led non-transparent persecution of hundreds of people. Hussain
continued: "While it is often claimed that the state of Pakistan has failed to effectively
protest against these violations, it may also be important to raise questions about the
possible role of the state in facilitating the NSA to access vast amounts of data of those
residing within its borders, in the context of its third-party SIGINT partnership." Other
press freedom groups said the case was just one more in a long-running pattern of civil
liberties abuses. "Given the flood of disclosures over the past two years about the NSA's
vast range of mass and intrusive surveillance techniques and targets, it is unsurprising,
but nevertheless shocking, that the intelligence agency thought it appropriate
to use its capabilities to spy on an eminent journalist," Carly Nyst, Legal
Director of Privacy International, told IPS. "This case is illustrative of the grave
dangers of allowing security services to exercise immense powers in the
absence of proper scrutiny. By placing members of the media, who themselves play
an essential accountability role, particularly in areas of conflict, under surveillance, the
NSA has undermined the very values it is charged with promoting - security,
democracy, and free flow of information. "Without democratic accountability, spy
agencies will continue to sacrifice civil liberties in the name of strategic gain, without
sparing a thought to the critical journalistic freedom caught in the cross hairs," she
added. It's not the first time the NSA has targeted Al Jazeera. Based on leaked
documents, the German magazine Der Spiegel reported in 2009 that it had hacked into
the news agency's internal communication system. According to the Committee to
Protect Journalists, NSA whistleblower Russell Tice claimed in 2009 that in fact,
the agency makes it a point to target journalists and news agencies. Zaidan was
targeted under the ominously titled SKYNET programme, which monitors bulk call
records and searches the metadata for particular patterns. "It's this kind of big,
sweeping data gathering that worries us the most," Bob Dietz, Asia programme
coordinator for the New York-based Committee to Protect Journalists, told IPS. "If
someone were to track my behavior and all the people I've come into contact with over
the last 20 years, I imagine I would come up on some sort of chart ranking very high,"
he said wryly. Dietz doesn't expect the situation to change anytime soon, regardless of
who occupies the White House. "This is the reality under which we live. Government
agencies are relatively autonomous and attempts to control them are
ludicrous...whether or not there are laws protecting us," he said. Thomas Hughes,
executive director of the London-based ARTICLE 19, said his group is deeply concerned
by the news of NSA spying on Zaidan. "According to statements from Al Jazeera and
colleagues from other networks, Zaidan is a journalist of longstanding professional
reputation. Surveillance of journalists has a serious chilling effect on freedom of
expression, impeding the crucial role journalists play in uncovering wrongdoing and
holding governments to account for their actions," he told IPS. "Compromising the
confidentially of sources also seriously undermines the ability of journalists to perform
their work and potentially endangers the wellbeing and safety of those sources." Indeed,
as noted by the Intercept, which broke the allegations, Zaidan's reporting focused on the
Taliban and Al Qaeda, including several high-profile interviews with senior Al Qaeda
leaders. In strenuously denying the allegations, he patiently explained, "For us to be able
to inform the world, we have to be able to freely contact relevant figures in the public
discourse, speak with people on the ground, and gather critical information. "Any hint of
government surveillance that hinders this process is a violation of press freedom and
harms the public's right to know," he wrote in a response to the Intercept. "To assert
that myself, or any journalist, has any affiliation with any group on account of their
contact book, phone call logs, or sources is an absurd distortion of the truth and a
complete violation of the profession of journalism."
1) Killed Pakistan bilateral dialogues w/ US that’s Ecotimes
2) Need dialogues for negotiating nuclear deal that’s Williams
14
Impact is huge:
IndoPak war kills billions
Diep July 18, 2014 (Francis Diep is a science journalist based in Santa Babara, CA.
“Computer Models Show Exactly What Would Happen to Earth after A Nuclear World
War”. July 18 2014. Popular Science.
http://www.popsci.com/article/science/computer-models-show-what-exactly-wouldhappen-earth-after-nuclear-war)//AF
After the Indian-Pakistani nuclear exchange… Five megatons of black carbon enter the atmosphere
immediately. Black carbon comes from burned stuff and it absorbs heat from the sun before it can reach
the Earth. Some black carbon does eventually falls back to Earth in rain. After one year, the average
surface temperature of the Earth falls by 1.1 kelvin, or about two degrees Fahrenheit. After five years,
the Earth is, on average, three degrees colder than it used to be. Twenty years on, our home planet
warms again to about one degree cooler than the average before the nuclear war. Earth's falling
temperatures reduces the amount of rain the planet receives. Year five after the war, Earth will have 9
percent less rain than usual. Year 26 after the war, Earth gets 4.5 percent less rain than before the war.
In years 2-6 after the war, the frost-free growing season for crops is shortened by 10 to 40 days,
depending on the region. Chemical reactions in the atmosphere eat away Earth's ozone layer, which
protects Earth's inhabitants from ultraviolet radiation. In the five years after the war, the ozone is 20 to
25 percent thinner, on average. Ten years on, the ozone layer has recovered so that it's now 8 percent
thinner. The decreased UV protection may lead to more sunburns and skin cancers in people, as well as
reduced plant growth and destabilized DNA in cropssuch as corn. In a separate study, published in 2013,
International Physicians for the Prevention of Nuclear War estimated 2 billion people would starve in
the wake of a 100-A-bomb war.
AT: Relations Good
India-Pakistan relations bad now
Nauman June 26 15 (Nauman is a Writer at The Wall Street Journal and Editor at
Newsweek. “Who’s to blame for Pakistan’s Heat Wave? Taliban Says Power
Companies, Government Minister Blames India”. The Wall Street Journal. June 26
2015. http://wsj.com/indiarealtime/2015/06/26/whos-to-blame-for-pakistans-heat-wavetaliban-says-power-companies-government-blames-india/)//AF
Agence France-Presse/Getty Images
ISLAMABAD — The Pakistani Taliban joined the chorus of criticism over response to the
devastating heat wave that has left more than 1,000 people dead in the country’s southern
Sindh province. But instead of blaming the government – their usual target – the militant group
blamed the power company in Karachi, the country’s largest city, for the heat-related deaths. The
group, formally known as the Tehreek-e-Taliban Pakistan, said on Friday that it holds K-Electric
responsible for the “human tragedy.” Most of the deaths in the heat wave, in which southern
Pakistan saw temperatures in triple digits for seven days straight, were reported from Karachi.
“Tehreek-e-Taliban Pakistan considers K-Electric fully responsible because of undue load shedding
[power outages] and greed for profits,” said Muhammad Khurasani, the Pakistani Taliban
spokesman, referring to the privately-owned power utility. Privately owned K-Electric said earlier this
week that the outages in Karachi were because of a spike in demand for electricity because of high
temperatures, as well as illegal connections. The city saw prolonged blackouts during the heat wave,
which began last Wednesday. Temperatures reached a high of 113 degrees Fahrenheit (45 degrees
Celsius) on Sunday. If K-Electric fails to improve its service, “in the interest of the oppressed people,
Tehreek-e-Taliban Pakistan will not hesitate to take proper steps against K-Electric,” said the group’s
spokesman. “This is obviously a concern for K-Electric that the TTP [Pakistani Taliban] have issued
a release like this,” said Taha Siddiqui, a spokesman for the utility. “As far as faults are concerned,
they have been reduced, and we have also reduced load shed [power cuts] in the last two days.”
The government of Prime Minister Nawaz Sharif and the provincial government of Sindh
also have blamed the power outages in Karachi on K-Electric, accusing it of not investing
in improved infrastructure and generation. The national and provincial government
blamed each other for lack of oversight. While the Taliban focused their ire on K-Electric,
a senior government official said a more familiar enemy may be responsible: India.
Mushahidullah Khan, Pakistan’s climate change minister, was reported by the daily Dawn as saying
coal power plants in the neighboring Indian state of Rajasthan could also be responsible for
the heat wave
AT: No Pakistani proliferation
Pakistan has enough weapons to go to war- sparked by US-India
deal
Bano June 22 15 (Saira Bano is a foreign relations reporter at The Stimson Center in Washington,
D.C. “Pakistan: Lessons from the U.S. –India Nuclear Deal.” June 22 2015.
http://thediplomat.com/2015/06/pakistan-lessons-from-the-india-us-nuclear-deal/)//AF
Following the India-U.S. nuclear deal, Pakistan accelerated efforts to take measures, both internally and
externally, to catch up to India’s nuclear capacity. Externally, apart from demanding a similar nuclear
deal, Pakistan signed a nuclear agreement with China in which the latter committed to provide two
nuclear reactors in apparent violation of NSG guidelines. After granting India a waiver, the NSG did not
condemn the Chinese deal with Pakistan. The lack of generality in the India NSG waiver has encouraged
China and Pakistan to seek a deal outside the NSG, but this approach has limitations and cannot be
sought on a regular basis. Pakistan has also repeatedly blocked consensus to start negotiations on the
FMCT (Fissile Material Control Treaty) due to its security concerns, despite pressure from major powers.
It fears that India would be able to increase its fissile material stockpiles as a result of the NSG waiver.
However, early conclusion of an FMCT is in fact in the interest of Pakistan, as it would freeze the
increasing asymmetry at a point where Pakistan already has enough nuclear weapons for its deterrence
against India.
Internally, Pakistan is stepping up production of enriched uranium and plutonium for weapons and is
considered to have the fastest-growing nuclear weapons program in the world. Pakistan also opted for
“Full Spectrum Deterrence,” which provides strategic and tactical tools to confront emerging threats
such as new offensive doctrines like India’s Cold Start doctrine.
AT: No Escalation
One nuke is all it takes
Betts 2k [Richard Professor and the Director of the Institute of War and Peace Studies at Columbia, “Universal Deterrence or
Conceptual Collapse? Liberal Pessimism and Utopian Realism,” The Coming Crisis: Nuclear Proliferation, U.S. Interests, and World
Order, ed. Utgoff p. 82] //JJ
Quite opposite reactions are imaginable. The shock might jar sluggish statesmen into taking the danger seriously, cutting through
shock might
prompt panic and a rush to stock up on WMD, as the possibility of use
underlines the need for deterrent capability, or the effectiveness of such
weapons as instruments of policy One seldom-noticed danger is that breakage of the taboo
could demystify the weapons and make them look more conventional than our
post-Hiroshima images of them. It helps to recall that in the 1930s, popular images of conventional
strategic bombing were that it would be apocalyptic, bringing belligerent countries to their
diplomatic and military red tape, and undertaking dramatic actions to push the genie back in the bottle. Or the
knees quickly. The apocalyptic image was fed by the German bombing of Guernica, a comparatively small city in Spain. When World
War II came in Europe, both British
and Germans initially refrained from bombing
attacks on cities. Once city bombing began and gathered steam, however, it
proved to be far less decisive than many had expected. British and German populations
managed to adjust and absorb it. Over time, however, the ferocity of Allied bombing of Germany and Japan did
approach the apocalyptic levels originally envisioned. In short, dire assumptions about the awesomeness of
strategic bombing deterred its initiation, but once initiated did not prevent gradual
escalation to the devastating level originally envisioned. Nuclear weapon inventories of
countries like India and Pakistan are likely to remain small in number and yield for some time. According to press reports, by some
U.S. estimates the yields of the 1998 tests were only a few kilotons. If the first weapon detonated in combat is a low-yield device in a
large city with uneven terrain and lots of reinforced concrete, it might only destroy a small part of the city A bomb that killed 10,000
to 20,000 people would be seen as a stunning catastrophe, but there are now many parts of the world where that number would be
less than 1 percent of a city’s population. The disaster could seem surprisingly limited, since in the
popular imagination (underwritten by the results in the small and flimsy cities of Hiroshima and Nagasaki), nuclear weapons mean
‘one bomb, one city” Awful destruction that yet seems surprisingly limited could prompt revisionist reactions among lay elites in
some countries about the meaning of nuclear ordnance.
2AC ADDON- FRANCE
France finds the recent wikileaks “unacceptable” and is moving to localize
their data
By ALISSA J. RUBIN and SCOTT SHANE 6/24 (JUNE 24, 2015. NYTimes.com.
“Hollande Condemns Spying by U.S., but Not Too Harshly”
[http://www.nytimes.com/2015/06/25/world/europe/wikileaks-us-spyingfrance.html])HW
PARIS — The
French government on Wednesday reacted with carefully calibrated anger
to revelations about extensive eavesdropping by the United States government on the
private conversations of senior French officials — including three presidents.
The modulated reaction suggested that the surveillance, by the National Security Agency, was
not a surprise and several French lawmakers and officials said as much, even noting that it was part of the diplomatic
game. In the immediate aftermath of news reports on the eavesdropping, which surfaced overnight Tuesday, President François
Hollande called an emergency meeting of the Defense Council to discuss documents published by the French news website
Mediapart, the left-leaning newspaper Libération and the anti-secrecy organization WikiLeaks, which obtained the documents.
Continue reading the main story RELATED COVERAGE The
lower house of the French parliament
held a vote on Tuesday to adopt new surveillance rules.Lawmakers in France Move to
Vastly Expand SurveillanceMAY 5, 2015 Chancellor Angela Merkel said in 2013, Germany, Too, Is Accused of Spying on FriendsMAY
5, 2015 Declassified Report Shows Doubts About Value of N.S.A.’s Warrantless Spying APRIL 24, 2015 Mr. Hollande spoke with
President Obama on Wednesday afternoon and later said in a statement that he had received assurances that such intelligence
gathering was no longer going on. NEWS CLIPS By The Associated Press 1:39 French Government Reacts to U.S. Spying Continue
reading the main storyVideo French Government Reacts to U.S. Spying Stéphane Le Foll, the French government spokesman, spoke
on Wednesday about documents released by WikiLeaks that alleged that the National Security Agency spied on French presidents
and officials. By The Associated Press on Publish Date June 24, 2015. Photo by Dominique Faget/Agence France-Presse — Getty
Images. The
French foreign minister, Laurent Fabius, also registered his
dissatisfaction, calling in Jane D. Hartley, the United States ambassador to
France, to protest the surveillance. The first French government statement released
Wednesday was spare but strongly worded, saying that the eavesdropping was
“unacceptable” and that the government would not “tolerate any actions
that put French security and the protection of French interests in danger.” Yet
subsequent statements took a milder tone. A statement from the Élysée Palace later spoke of intelligence officials traveling to
Washington to “deepen cooperation,” although earlier in the day, there had been talk of the officials going to verify that the
surveillance had truly stopped. The
revelations come as France is debating legislation
that would allow the mass collection of data, as well as more targeted
eavesdropping, by its intelligence services. Continue reading the main story RELATED IN OPINION
Editorial: Domestic Spying, French StyleDEC. 13, 2013 The new information, gleaned from electronic surveillance data, focuses on
French officials from 2006 to 2012. WikiLeaks did not say where it had obtained it. Julian Assange, a founder of WikiLeaks, is listed
as one of the authors of the Mediapart and Libération articles. Leaked N.S.A. documents have previously upended American
diplomatic ties with a close ally. Relations between Washington and Berlin cooled significantly after reports in October 2013 accused
the agency of monitoring one of Chancellor Angela Merkel’s cellphones. France has a long history of spying on both friends and foes,
especially in the arena of industrial intelligence, although it draws the line — as most countries do — at spying on national leaders.
Still, it seems less inclined to condemn the United States unequivocally for engaging in surveillance. The Mediapart and Libération
articles featured conversations involving three French presidents: Jacques Chirac, Nicolas Sarkozy and Mr. Hollande. The
information that was released was largely predictable, although it was not the kind that anyone involved would want distributed to a
wider audience. Notes written by unnamed analysts about conversations in 2012 between Mr. Hollande and his prime minister at
the time, Jean-Marc Ayrault, show that Mr. Hollande was already worried about the economic situation in Greece. Fearing that Ms.
Merkel was too rigid in her approach, he reached out to the Social Democrats in Germany, who were in the opposition at the time.
Mr. Hollande is a member of the Socialist Party in France, but as a national leader he would be expected to deal with his counterpart
rather than with an opposition party. Mr. Sarkozy comes across in the documents as grandiose, expressing the view that he was the
one who could “solve the world financial crisis,” according to one cable. Mr. Sarkozy is expected to be a candidate for the 2017
presidential elections. The only cable that features Mr. Chirac suggests that his highly detailed instructions for his foreign minister,
Philippe Douste-Blazy, were the product of worries that the minister was unreliable. The comment in the cable reads: “Chirac’s
detailed orders may be in response to the foreign minister’s propensity, amply demonstrated in the past and the impetus behind a
number of presidential reprimands, for making ill-timed or inaccurate remarks.” Mr. Chirac could not be reached for comment. The
spying report intruded at a Washington news conference with Secretary of State John Kerry on Wednesday at the close of a meeting
with senior Chinese officials. Mr. Kerry alluded to his own “terrific relationship" with Mr. Fabius, and, like Mr. Obama, insisted that
no spying was going on now, even as he was silent about the past. Mr. Kerry dismissed the published material as “an old WikiLeaks
document.” In a statement released early Wednesday, the National Security Council said, “We are not targeting and will not target
the communications of President Hollande.” “Indeed, as we have said previously, we
do not conduct any
foreign intelligence surveillance activities unless there is a specific and
validated national security purpose. This applies to ordinary citizens and
world leaders alike,” the statement said. Mr. Sarkozy’s office said he would not comment. Several of his former
ministers and top aides denounced the practice, but Mr. Sarkozy’s former diplomatic counselor, Jean-David Levitte, said he was “not
surprised” by the articles, adding that as ambassador to the United Nations, he always knew that someone was listening. Although it
was not clear what method the N.S.A. used to gather the data that was disclosed overnight Tuesday, most of the leaked cables have
the word “unconventional” typed below the text, and one includes the notation “foreign satellite.” While WikiLeaks did not identify
the source of the documents, they predated the spring of 2013, when the N.S.A. contractor Edward J. Snowden took an archive of
intelligence documents to Hong Kong and gave them to several journalists. WikiLeaks has subsequently assisted him, although it has
not been heavily involved in the publication of those documents.
Historically, with few exceptions, the N.S.A.
has intercepted all foreign communications it could get access to if they
were of conceivable intelligence interest. But the Snowden disclosures meant that for the first time,
American officials had to balance the potential intelligence value of a target against the possible diplomatic fallout if the intercept
was publicly revealed. Matthew M. Aid, an intelligence historian and author of books on national security, said WikiLeaks’ failure to
say whether the new documents came from Mr. Snowden’s collection raised the possibility that a different insider was the source of
the leak. “If it’s a second leaker, it’s a nightmare for the agency,” he said. Since 2013, N.S.A. officials have spent millions of dollars to
improve the agency’s internal security to prevent leaks and to detect and trace them if they occur.
Econ
Over reach and loss of multistakerism collapses American economy
Eoyang and Horwitz ’13. (Gabriel Horwitz and Mieke Eoyang who is the Director of
the National Security Program at Third Way, a center-left think tank. She previously
served as Defense Policy Advisor to Senator Edward M. Kennedy, and a subcommittee
staff director on the House Permanent Select Committee on Intelligence, as well as as
Chief of Staff to Rep. Anna Eshoo (D-Palo Alto) “NSA Snooping's Negative Impact On
Business Would Have The Founding Fathers 'Aghast'” Mieke Eoyang & Gabriel Horwitz.
12/20/2013 http://www.forbes.com/sites/realspin/2013/12/20/nsa-snoopingsnegative-impact-on-business-would-have-the-founding-fathers-aghast/ //JJ
James Madison would be “aghast.” That was one of the incendiary charges leveled at the
National Security Agency and its mass surveillance activities by Judge Richard Leon in
his December 16 opinion ordering the government to stop collecting some of the data
that it’s been gathering on private citizens here and abroad. But Thomas Jefferson might
be horrified as well, because the NSA collection efforts are having a fairly profound
effect on American business and its efforts to sell goods and services abroad. Jefferson, a
big believer in the American “taste for navigation and commerce,” would be dismayed
that our government was doing things that could hurt our competitiveness and our
ability to set the terms of global trade. To be sure, there has always been some tension
between U.S. high-tech industries and our national security. In the 90s, the rules were
fairly primitive, such as limitations on exports of high-performance computing designed
to prevent countries from developing weapons of mass destruction. Those restrictions
were quickly rendered outdated by Moore’s Law, but had they remained they would
have prevented the exports of game consoles like Xbox. Since then, increased
globalization and the rise of terrorist organizations operating in the
shadows and across national boundaries have complicated both the
security and economic issues. The current debate about Edward Snowden’s
intelligence revelations may seem like an unlikely place to see that tension emerge, but
beyond the discussions of civil liberties and counterterrorism, it is becoming clear
that the post-9/11 surveillance apparatus may be at cross-purposes with our
high-tech economic growth. The revelations about the scope and scale of
NSA’s surveillance both at home and abroad have made many uneasy about
the security of their data. This loss of trust could have ongoing
consequences for the U.S. economy and for the future development of the
Internet. Policymakers must understand these implications as they make decisions on
how to reform our surveillance efforts. First, what will this mean for American
competitiveness? For years, the Internet has been largely “Made in America”,
but the technical architecture and data transcend national borders.
European, Chinese, Russian, and other global competitors are vying for the billions of
consumers who currently use U.S. Internet services every day—from Google to Facebook
to Ebay. One major competitive global advantage for U.S. companies is that
America’s openness and freedoms have brought an implied level of trust in
the security and privacy of the data flowing through their servers. But when
the U.S. government asserts that it can exploit electronic data abroad for intelligence
purposes, it creates an international reaction with profound economic consequences.
For example, Europe’s Commissioner for digital affairs, Neelie Kroes, predicts the
fallout from Snowden’s leaks will have “multi-billion Euro consequences” for US
businesses. The EU Commission’s Vice President, Viviane Reding, is pushing for Europe
to adopt more expansive privacy laws that will help build market share for regional
companies—thereby shutting American companies out. The economic
consequences could be staggering. Studies by leading Internet researchers at ITIF,
Gartner, and Forrester examining the NSA surveillance revelations’ impact project
potential lost revenue for U.S. cloud computing companies ranging from $35
billion to $180 billion over the next three years. More than half of the overseas
members of a cloud industry group, the Cloud Security Alliance, said they were less
likely to use U.S. cloud providers in the future. Ten percent of such members said they
had cancelled a U.S. cloud services project as a result of the “Snowden Incident”. While
the true costs of the loss of trust are hard to quantify, and will be reported in future
quarters, the potential losses are enormous.
The technology industry is vital to the American Economy
Muro et all. ’15. (Mark Muro, Jonathan Rothwell, Scott Ande, Kenan Fikri, Siddharth
Kulkarni, Mark Muro, a senior fellow and director of policy for the Metropolitan Policy
Program, manages the program's economic work and key policy projects. Jonathan
Rothwell is a fellow at the Metropolitan Policy Program. His research focuses on labor
market economics, social mobility, access to education, and the sources of economic
growth. Scott Andes is a senior policy analyst at the Metropolitan Policy Program. His
work focuses on advanced industries, innovation and technology, and economic
development. Kenan Fikri is a senior policy analyst with the Metropolitan Policy
Program. His work focuses on regional economic development policy and practice.
Siddharth Kulkarni is a senior research assistant at the Metropolitan Policy Program.
His research focuses on tracking economic recovery and regional manufacturing
industries) Brookings Institution February 3, 2015. “America's Advanced Industries”
http://www.brookings.edu/research/reports2/2015/02/03-advancedindustries#/M10420
The need for economic renewal in the United States remains urgent. Years of
disappointing job growth and stagnant incomes for the majority of workers
have left the nation shaken and frustrated. At the same time, astonishing new
technologies—ranging from advanced robotics and “3-D printing” to the “digitization of
everything”—are provoking genuine excitement even as they make it hard to see where
things are going. Hence this paper: At a critical moment, this report asserts the
special importance to America’s future of what the paper calls America’s
“advanced industries” sector. Characterized by its deep involvement with
technology research and development (R&D) and STEM (science,
technology, engineering, and math) workers, the sector encompasses 50
industries ranging from manufacturing industries such as automaking and
aerospace to energy industries such as oil and gas extraction to high-tech services such
as computer software and computer system design, including for health applications.
These industries encompass the nation’s “tech” sector at its broadest and
most consequential. Their dynamism is going to be a central component of
any future revitalized U.S. economy. As such, these industries encompass the
country’s best shot at supporting innovative, inclusive, and sustainable
growth. For that reason, this report provides a wide-angle overview of the advanced
industry sector that reviews its role in American prosperity, assesses key trends, and
maps its metropolitan and global competitive standing before outlining high-level
strategies to enhance that. The overview finds that: 1. Advanced industries
represent a sizable economic anchor for the U.S. economy and have led the
post-recession employment recovery. Modest in size, the sector packs a
massive economic punch. As an employer and source of economic activity the
advanced industry sector plays a major role in the U.S. economy. As of 2013, the
nation’s 50 advanced industries (see nearby box for selection criteria) employed
12.3 million U.S. workers. That amounts to about 9 percent of total U.S.
employment. And yet, even with this modest employment base, U.S. advanced
industries produce $2.7 trillion in value added annually—17 percent of all
U.S. gross domestic product (GDP). That is more than any other sector,
including healthcare, finance, or real estate. At the same time, the sector employs
80 percent of the nation’s engineers; performs 90 percent of private-sector
R&D; generates approximately 85 percent of all U.S. patents; and accounts
for 60 percent of U.S. exports. Advanced industries also support unusually
extensive supply chains and other forms of ancillary economic activity. On a per
worker basis, advanced industries purchase $236,000 in goods and services
from other businesses annually, compared with $67,000 in purchasing by other
industries. This spending sustains and creates more jobs. In fact, 2.2 jobs are created
domestically for every new advanced industry job—0.8 locally and 1.4 outside of the
region. This means that in addition to the 12.3 million workers employed by
advanced industries, another 27.1 million U.S. workers owe their jobs to
economic activity supported by advanced industries. Directly and indirectly,
then, the sector supports almost 39 million jobs—nearly one-fourth of all U.S.
employment.
The US economy is driving global economy, a slowdown in the us
would mean a slowdown around the world
Miller January 9, 2015. (Rich Miller reporter for Bloomberg. “U.S. Retakes the Helm
of the Global Economy” Rich Miller. http://www.bloomberg.com/news/articles/201501-09/u-s-retakes-the-helm-of-the-global-economy//JJ
(Bloomberg) -- The U.S. is back in the driver’s seat of the global economy after
15 years of watching China and emerging markets take the lead. The world’s biggest
economy will expand by 3.2 percent or more this year, its best performance
since at least 2005, as an improving job market leads to stepped-up consumer
spending, according to economists at JPMorgan Chase & Co., Deutsche Bank AG and
BNP Paribas SA. That outcome would be about what each foresees for the
world economy as a whole and would be the first time since 1999 that
America hasn’t lagged behind global growth, based on data from the
International Monetary Fund. “The U.S. is again the engine of global
growth,” said Allen Sinai, chief executive officer of Decision Economics in New York.
“The economy is looking stellar and is in its best shape since the 1990s.” In the latest
sign of America’s resurgence, the Labor Department reported on Jan. 9 that payrolls
rose 252,000 in December as the unemployment rate dropped to 5.6 percent, its lowest
level since June 2008. Job growth last month was highlighted by the biggest gain in
construction employment in almost a year. Factories, health-care providers and
business services also kept adding to their payrolls. About 3 million more Americans
found work in 2014, the most in 15 years and a sign companies are optimistic
U.S. demand will persist even as overseas markets struggle. U.S. government
securities rose after the report as investors focused on a surprise drop in hourly wages
last month. Ten-year Treasury yields declined seven basis points to 1.95 percent at 5
p.m. in New York on Jan. 9. “We are still waiting to see the kind of strengthening of
wage numbers we would expect to be consistent with what we are seeing elsewhere in
terms of growth and the absolute jobs numbers,” Federal Reserve Bank of Atlanta
President Dennis Lockhart said in a Jan. 9 interview. Breaking Away The U.S. is
breaking away from the rest of the world partly because it has had more success working
off the debt-driven excesses that helped precipitate the worst recession since the Great
Depression. “The progress has been far greater in the U.S.,” Glenn Hubbard, dean of the
Columbia Business School in New York and a former chief White House economist, told
the American Economic Association annual conference in Boston on Jan. 3.
Delinquencies on consumer installment loans fell to a record-low 1.51 percent in the
third quarter, the American Bankers Association said on Jan. 8. That’s “well under” the
15-year average of 2.3 percent on such loans, which include credit cards and borrowing
for car purchases and home improvements, it said. U.S. households have benefited from
the strengthening job market and the collapse in oil prices. The nationwide average cost
of a gallon of regular gasoline was $2.13 on Jan. 11, the cheapest since May 2009,
according to figures from motoring group AAA. Wage Gains While wage gains have
lagged -- average hourly earnings fell 0.2 percent last month from November -- they will
accelerate as the labor market continues to tighten, according to Mohamed El-Erian, a
Bloomberg View columnist and an adviser to Munich-based Allianz SE. “It’s just a
matter of time before wage growth picks up,” he told Bloomberg Television’s “In The
Loop” program on Jan. 9. Spending is already strengthening. Households splurged on
new cars, appliances, televisions and clothing as spending climbed 0.6 percent in
November, double the gain in October, according to figures from the Commerce
Department in Washington. Light-vehicle sales totaled 16.5 million in 2014, the most
since 2006. “The economy picked up a nice tailwind at the end of the year,” Bill Fay,
group vice president for Toyota Motor Corp.’s U.S. sales arm, said on a Jan. 5
conference call. “This strength will carry the auto industry to a sixth straight year of
growth in 2015 with analyst projections ranging as high as 17 million.” Consumer
Spending At $11.5 trillion in 2013, U.S. personal consumption expenditures
were larger than the gross domestic product of any other country that year,
including China, according to statistics from the IMF in Washington. The figures aren’t
adjusted to reflect price discrepancies for the same goods in different nations -- socalled purchasing power parity -- which tends to inflate the output of developing nations
where consumers pay less for everything from haircuts to coffee. Deutsche Bank
economists led by David Folkerts-Landau in London forecast U.S. GDP will expand 3.7
percent this year, after climbing 2.5 percent in 2014. The U.S. will contribute close
to 18 percent to global growth of 3.6 percent in 2015, compared with 11 percent for
all other industrial countries combined, they wrote in a Jan. 9 report. While the U.S.
is gathering strength, the BRIC nations -- Brazil, Russia, India and China -are facing tougher times after spending much of the past 15 years basking in the
attention of global investors. BRICs Faltering Brazil’s debt was downgraded last year for
the first time in a decade while Russia is heading into recession, its economy pummeled
by the collapse of oil prices and U.S. and European sanctions. Growth in China and
India has slowed as both countries grapple with revamping their
economies. “Close the book on emerging markets driving global growth,” Nancy Lazar,
co-founder and a partner at Cornerstone Macro LP in New York, wrote in a Jan. 8 report
to clients. Even Jim O’Neill, the former Goldman Sachs Group Inc. chief economist who
coined the BRIC acronym, has soured on some of its members, saying in an e-mail that
he would be tempted to remove Brazil and Russia from the group if they fail to revive
their flagging economies. “It is tough for the BRIC countries to all repeat their
remarkable growth rates” of the first decade of this century, said O’Neill, a
Bloomberg View columnist and former chairman of Goldman Sachs Asset Management
International.
XTN
US China Ext:
Economic growth is key to prevent U.S-China Conflict
HSU 11-[“Economic Ties Could Help Prevent US-China War” Jeremy Hsu, Innovation
NewsDaily Senior Writer; 01 November 2011 05:32 PM ET;
http://www.innovationnewsdaily.com/660-china-military-cyber-nationalsecurity.html]
As the U.S. faces China's economic and military rise, it also holds a
dwindling hand of cards to play in the unlikely case of open conflict.
Cyberattacks aimed at computer networks, targeted disabling of satellites
or economic warfare could end up bringing down both of the frenemies.
That means ensuring the U.S. economy remains strong and well-balanced,
with China's economy possibly representing the best deterrent, according to a
new report. The Rand Corporation's analysts put low odds on a China-U.S. military
conflict taking place, but still lay out danger scenarios where the U.S. and China
face greater risks of stumbling into an unwanted war with one another.
They point to the economic codependence of both countries as the best bet
against open conflict, similar to how nuclear weapons ensured mutually assured
destruction for the U.S. and Soviet Union during the Cold War. War Militaria Collectors
www.JCAmericana.comWe Buy War Artifacts & Militaria Free Appraisals for
AuthenticityLearn German in 10 Days PimsleurApproach.com/Learn-GermanWorldfamous Pimsleur Method. As seen on PBS - $9.95 w/ Free S&H.VA Home Loan for
Veterans www.VAMortgageCenter.comGet a Quote in 2 Minutes! VA Loans now Up to
$729,000 with $0 Down. Ads by Google "It is often said that a strong economy is the
basis of a strong defense," the Rand report says. "In the case of China, a strong U.S.
economy is not just the basis for a strong defense, it is itself perhaps the
best defense against an adventurous China." Such "mutually assured
economic destruction" would devastate both the U.S. and China, given how
China represents America's main creditor and manufacturer. The economic
fallout could lead to a global recession worse than that caused by the
financial crisis of 2008-2009. The U.S. still spends more than five times on defense
compared with China, but Rand analysts suggest that China's defense budget could
outstrip that of the U.S. within the next 20 years. The U.S. Air Force and Navy's current
edge in the Pacific has also begun to shrink as China develops aircraft, ships,
submarines and missiles capable of striking farther out from its coast. Existing U.S.
advantages in cyberwar and anti-satellite capabilities also don't offset the fact that the
U.S. military depends far more heavily on computer networks and satellites than China's
military. That makes a full-out cyberwar or satellite attacks too risky for the U.S., but
perhaps also for China. "There are no lives lost — just extensive harm, heightened
antagonism, and loss of confidence in network security," Rand analysts say. "There
would be no 'winner.'" Open military conflict between China and the U.S. could
also have "historically unparalleled" economic consequences even if neither
country actively engages in economic warfare, Rand analysts say. The U.S.
could both boost direct defense in the unlikely case of war and reduce the
risk of escalation by strengthening China's neighbors. Such neighbors,
including India, South Korea, Japan and Taiwan, also represent possible
flashpoints for China-U.S. conflict in the scenarios laid out by the Rand
report. Other possible danger zones include the South China Sea, where
China and many neighboring countries have disputes over territorial
claims, as well as in the murkier realm of cyberspace. Understandably, China
has shown fears of being encircled by semi-hostile U.S. allies. That's why Rand analysts
urged the U.S. to make China a partner rather than rival for maintaining international
security. They also pointed out, encouragingly, that China has mostly taken "cautious
and pragmatic" policies as an emerging world power. "As China becomes a true
peer competitor, it also becomes potentially a stronger partner in the
defense as well as economic field," the Rand analysts say.
US Economic failure kills SQ check on Chinese miscalc
Glaser 5/2/12 “China is Reacting to Our Weak Economy” Bonnie S. Glaser (senior fellow at the Center for Strategic
and International Studies.) 5/2/2012 http://www.nytimes.com/roomfordebate/2012/05/02/are-we-headed-for-a-cold-war-withchina/china-is-reacting-to-our-weak-economy
To maintain peace and stability in the Asia-Pacific region and secure American interests,
the United States must sustain its leadership and bolster regional
confidence in its staying power. The key to those goals is reinvigorating the U.S.
economy. Historically, the Chinese have taken advantage of perceived American weakness and shifts in the global balance of
power. In 1974 China seized the Paracel Islands from Saigon just after the United States and the Socialist Republic of Vietnam
signed the Paris Peace Treaty, which signaled the U.S. withdrawal from the region. When the Soviet leader Mikhail Gorbachev met
one of Deng Xiaoping’s “three obstacles” requirements for better ties and withdrew from Can Ranh Bay, Vietnam, in 1988, China
snatched seven of the Spratly Islands from Hanoi. Two decades later, as the United States-Philippines base agreement was
terminated, China grabbed Mischief Reef from Manila. Beijing must not be allowed to conclude that an economic downturn means
our ability to guarantee regional stability has weakened. The
Chinese assertive behaviors against its
neighbors in recent years in the East China Sea, the South China Sea and the Yellow Sea were in part a consequence
of China’s assessment that the global financial crisis signaled the beginning of U.S. decline and a shift in the
balance of power in China’s favor. The Obama administration’s “rebalancing” or “pivot” to Asia
will help prevent Chinese miscalculation and increase the confidence of U.S. partners in U.S.
reliability as the ballast for peace and stability in the region. But failure to follow through with actions
and resources would spark uncertainty and lead smaller countries to accommodate Chinese interests in
the region. Most important, the United States must revive its economy. China will inevitably overtake
the United States as the largest economy in the world in the coming decade or two. The United States must not
let Beijing conclude that a relative decline in U.S. power means a weakened
United States unable to guarantee regional peace and stability. The Chinese
see the United States as mired in financial disorder, with an alarming budget deficit, high
unemployment and slow economic growth — which, they predict, will lead to America's demise as the
sole global superpower. To avoid Chinese miscalculation and greater
United States-China strategic competition, the United States needs to
restore financial solvency and growth through bipartisan action.
One nuke is all it takes
Betts 2k [Richard Professor and the Director of the Institute of War and Peace Studies at Columbia, “Universal Deterrence or
Conceptual Collapse? Liberal Pessimism and Utopian Realism,” The Coming Crisis: Nuclear Proliferation, U.S. Interests, and World
Order, ed. Utgoff p. 82] //JJ
Quite opposite reactions are imaginable. The shock might jar sluggish statesmen into taking the danger seriously, cutting through
shock might
prompt panic and a rush to stock up on WMD, as the possibility of use
underlines the need for deterrent capability, or the effectiveness of such
weapons as instruments of policy One seldom-noticed danger is that breakage of the taboo
could demystify the weapons and make them look more conventional than our
post-Hiroshima images of them. It helps to recall that in the 1930s, popular images of conventional
strategic bombing were that it would be apocalyptic, bringing belligerent countries to their
diplomatic and military red tape, and undertaking dramatic actions to push the genie back in the bottle. Or the
knees quickly. The apocalyptic image was fed by the German bombing of Guernica, a comparatively small city in Spain. When World
War II came in Europe, both British
and Germans initially refrained from bombing
attacks on cities. Once city bombing began and gathered steam, however, it
proved to be far less decisive than many had expected. British and German populations
managed to adjust and absorb it. Over time, however, the ferocity of Allied bombing of Germany and Japan did
approach the apocalyptic levels originally envisioned. In short, dire assumptions about the awesomeness of
strategic bombing deterred its initiation, but once initiated did not prevent gradual
escalation to the devastating level originally envisioned. Nuclear weapon inventories of
countries like India and Pakistan are likely to remain small in number and yield for some time. According to press reports, by some
U.S. estimates the yields of the 1998 tests were only a few kilotons. If the first weapon detonated in combat is a low-yield device in a
large city with uneven terrain and lots of reinforced concrete, it might only destroy a small part of the city A bomb that killed 10,000
to 20,000 people would be seen as a stunning catastrophe, but there are now many parts of the world where that number would be
less than 1 percent of a city’s population. The disaster could seem surprisingly limited, since in the
popular imagination (underwritten by the results in the small and flimsy cities of Hiroshima and Nagasaki), nuclear weapons mean
‘one bomb, one city” Awful destruction that yet seems surprisingly limited could prompt revisionist reactions among lay elites in
some countries about the meaning of nuclear ordnance.
Nuclear war causes extinction
Robock 11 [Alan – Prof Environmental Science @ Rutgers. “Nuclear Winter is a Real
and Present Danger” Nature, Vol 473. Summer 2011 Ebsco]
In the 1980s, discussion and debate about the possibility of a ‘nuclear winter’ helped to end the arms race between the United States
and the Soviet Union. As former Soviet president Mikhail Gorbachev said in an interview in 2000: “Models made by Russian and
American scientists showed that a
nuclear war would result in a nuclear winter that
would be extremely destructive to all life on Earth; the knowledge of that was a great stimulus
to us, to people of honour and morality, to act.” As a result, the number of nuclear weapons in the world started to fall, from a peak
of about 70,000 in the 1980s to a total of about 22,000 today. In another five years that number could go as low as 5,000, thanks to
the New Strategic Arms Reduction Treaty (New START) between the United States and Russia, signed on 8 April 2010. Yet the
environmental threat of nuclear war has not gone away. The world faces the
prospect of a smaller, but still catastrophic, nuclear conflict. There are now
nine nuclear-weapons states. Use of a fraction of the global nuclear arsenal
by anyone, from the superpowers to India versus Pakistan, still presents the
largest potential environmental danger to the planet by humans. That
threat is being ignored. One reason for this denial is that the prospect of a
nuclear war is so horrific on so many levels that most people simply look
away. Two further reasons are myths that persist among the general public: that the nuclear
winter theory has been disproved, and that nuclear winter is no longer a
threat. These myths need to be debunked. The term ‘nuclear winter’, coined by Carl Sagan and his
colleagues in a 1983 paper1 in Science, describes the dramatic effects on the climate caused by smoke from fires ignited by nuclear
attacks on cities and industrial areas. In the 1980s my colleagues and I calculated, using
the best climate
models available at the time, that if one-third of the existing arsenal was used,
there would be so much smoke that surface temperatures would plummet
below freezing around the world for months, killing virtually all plants and
producing worldwide famine. More people could die in China from starvation than in the nations actively
bombing each other. As many countries around the world realized that a superpower nuclear war would be a disaster for them, they
pressured the superpowers to end their arms race. Sagan did a good job of summarizing the policy impacts2 in 1984: although
weapons were continuing to be built, it would be suicide to use them. The idea of climatic catastrophe was fought against by those
who wanted to keep the nuclear-weapon industry alive, or who supported the growth of nuclear arsenals politically3.
Scientifically, there was no real debate about the concept, only about the
details. In 1986, atmospheric researchers Starley Thompson and Stephen Schneider wrote a piece in Foreign Affairs appraising
the theory4 and highlighting what they saw as the patchiness of the effect. They coined the term ‘nuclear autumn’, noting that it
wouldn’t be ‘winter’ everywhere in the aftermath of a nuclear attack. They didn’t mean for people to think that it would be all raking
leaves and football games, but many members of the public, and some pro-nuclear advocates, preferred to take it that way. The fight
over the details of the modelling caused a rift between Sagan and Schneider that never healed. When I bring up the topic of nuclear
winter, people invariably tell me that they think the theory has been disproved. But research continues to support the original
concept. By
2007, models had began to approximate a realistic atmosphere up
to 80 kilometres above Earth’s surface, including the stratosphere and
mesosphere. This enabled me, and my coauthors, to calculate for the first time that
smoke particles would be heated by the Sun and lifted into the upper
stratosphere, where they would stay for many years5,6. So the cooling would
last for much longer than we originally thought. DARK DAYS Many of those who
do accept the nuclear-winter concept think that the scenario applies only to
a mass conflict, on a scale no longer conceivable in the modern world. This
is also false. A ‘small’ nuclear war between India and Pakistan, with each
using 50 Hiroshima-size bombs (far less than 1% of the current arsenal), if
dropped on megacity targets in each country would produce climate change
unprecedented in recorded human history 5. Five million tonnes of black
carbon smoke would be emitted into the upper troposphere from the burning cities, and
then be lofted into the stratosphere by the heat of the Sun. Temperatures would be lower than during
the ‘Little Ice Age’ (1400–1850), during which famine killed millions. For several years, growing seasons would be
shortened by weeks in the mid-latitudes (see ‘A decade of cooling). Brian Toon at the University of Colorado in Boulder, Richard
Turco at the University of California, Los Angeles, Georgiy Stenchikov at Rutgers University in New Brunswick, New Jersey, and I,
all of whom were pioneers in nuclear-winter research in the 1980s, have tried, along with our students, to publicize our results. We
have published refereed journal articles, popular pieces in Physics Today and Scientific American, a policy forum in Science, and
now this article. But Foreign Affairs and Foreign Policy, perhaps the two most prominent foreign-policy magazines in English, would
not even review articles we submitted. We have had no luck getting attention from the US government. Toon and I visited the US
Congress and gave briefings to congressional staff on the subject two years ago, but nothing happened as a result. The US President’s
science adviser John Holdren has not responded to our requests — in 2009 and more recently — for consideration of new scientific
results in US nuclear policy. The only interest at a national level I have had was somewhat surreal: in September 2010, Fidel Castro
summoned me to a conference on nuclear winter in Havana, to help promote his new view that a
nuclear conflict
would bring about Armageddon. The next day, my talk — the entire 90 minutes including questions — was
broadcast on nationwide television in prime time, and appeared on the front page of the two national newspapers in Cuba. As in the
1980s, it is still too difficult for most people to fully grasp the consequences of a nuclear conflict. But it must be grasped. We
scientists must continue to push our results out to the public and to policymakers, so they can in turn push political will in the
direction of disarmament. Just as Gorbachev, armed with the knowledge of nuclear winter, helped to end the cold war, so too can the
politicians of today use science to support further reductions in arms. The New START treaty is not enough.
Business Confidence Ext
There has been a major decline in business confidence due to a
breach in trust with the tech industry
Cofino, ’15 (Writer for the Guardian January 21, 2015. “Public trust in business hits
five-year low” Jo Confino in Davos. http://www.theguardian.com/sustainablebusiness/2015/jan/21/public-trust-global-business-government-low-decline //JJ
For how many years do business leaders need to hear that their customers do not trust
them nor the companies they lead before they do something about it? To coincide with
the opening of the World Economic Forum in Davos, public relations company Edelman
has just released its 15th annual trust barometer, which signals that a short recovery in
people’s faith in the corporate sector has gone into reverse. In fact, trust in
business declined in two-thirds of the 27 markets the survey covers and is now
below 50% in 14 markets, the worst showing since 2008. The largest drops occurred in
Canada, Germany, Australia and Singapore. Even the once impregnable
technology industry, which is still the most trusted sector, saw declines in the
majority of countries for the first time. The fall in trust in CEOs as credible
spokespeople continued for the third consecutive year, with levels now at one third in
developed markets. Globally, CEOs (at 43%) and government officials (at 38%) continue
to be the least credible information sources, lagging far behind academic or industry
experts, who are rated at 70%. Only a fifth of respondents thought business leaders were
the most trusted influencers to communicate purpose and engagement. It’s not difficult
to see why the 33,000 people who took part in the Edelman survey have so little
confidence in CEOs. For example, nearly half say that there is not enough regulation of
business. Across major industries surveyed, a similar percentage have little faith in
policymakers to develop and implement appropriate regulations. Contrast this with the
PwC global CEO survey released in Davos yesterday, which showed that 78% of business
leaders see too much regulation as the biggest risk to growth – the highest level ever
seen in the 15 year history of the study. Concern about over-regulation reached 90% in
the US, 87% in the UK and 85% in China. Simon Zadek, visiting scholar at
Tsinghua School of Economics and Management in Beijing and co-director
of the United Nations Environment Program (UNEP) Inquiry, says the low
trust scores show that businesses have to increase their levels of
accountability. Speaking in Davos, Zadek said: “Citizens effectively give corporations
a license to operate and, in return, companies need to align themselves
demonstrably to the public interest.
Tech Leadership Loss Ext
*Revelations of NSA spying is making the US lose its tech
leadership as companies choose to business with other
countries.
Phipps ’13 Former Chief Open Source Officer at Sun Microsystems. (Simon, “The
NSA's other victim: U.S. business competitiveness” Infoworld.
http://www.infoworld.com/article/2609611/open-source-software/the-nsa-s-othervictim--u-s--business-competitiveness.html /JJ
This week, a review panel commissioned by the White House determined that the NSA
needs reining in to prevent overreaching and damaging America. The day before the
panel released its recommendations, a delegation of technology business leaders visited
the White House to register its concerns about the NSA. Are the latter's concerns purely
patriotic? Clearly not. The consequences of the unconstitutional overreach of
the NSA and other parts of America's security apparatus on American technology
business are already being felt. Last week saw an investor lawsuit against
IBM for its collaboration with the NSA, and it seems likely similar cases will
follow as other technology companies, such as Microsoft, have also been found
collaborating with the NSA. But far more serious is the destabilization of trust
in these businesses. One element is the jurisdictional gravity imposed, as foreign
customers are subjected to U.S. oversight. Another is the commitment of many
American companies to proprietary solutions. When backdoors are suspected, the
only recourse is to trust the word of the supplier since the source is closed.
If that can't be relied upon -- either for ethical reasons or because the
company is jurisdictionally subject to gagging orders -- then customers will
flee. Who benefits from that concern? Companies in independent jurisdictions and
companies working with open source software. Switzerland in particular seems to offer
the same haven for the digital world that it's traditionally offered the financial world.
Swiss domain names cut the connection to U.S. control and give confidence that
government interference in routing customers to one's business is less likely. More
significantly, cloud providers are now emphasizing the benefits of doing business in
Switzerland. Swiss cloud account The problem with cloud computing, in a nutshell, is
that the savings you gain from both scale and outsourced operation may come at a cost
later in the cycle. Cloud solutions bring economies of scale achieved by grouping the
needs of many different businesses into a common data center, which also means the
minutiae of operations and the management of logistical and practical issues are
outsourced. This is all good. But the source of the benefits is also the source of the
problems. The company you trade with has your needs not as its exclusive priority, but
as one of many. In the end, if your needs become exceptional, letting you down will
simply be part of their cost of doing business. Their jurisdiction gets added to your
operating parameters as well. It's no longer enough to understand the legal boundaries
of trading in your own state; you now also have to take into account the consequences of
your data being processed in your cloud provider's state. The state-owned telco
SwissCom is offering a range of cloud offerings, all managed in and from
Switzerland and marketed on the basis of avoiding NSA intrusion. While they
admit to having little control over spying on their services from abroad, the insulation
provided by Swiss law seems an important benefit. It's not just SwissCom who want to
be the Switzerland of cloud. Open source developers at Kolab have similar aspirations.
They have a better deal, too; their software is open source, so it's not just
lock-in by a different party. They are offering a full suite of productivity
solutions equivalent to Google's and Microsoft's offerings -- mail, calendar,
file storage, and more -- all hosted in and from Switzerland and
implemented in open source software. In addition to the confidence Swiss hosting
instills, it's also possible to take the same open source software the Swiss deploy and
host it yourself if you prefer, so that in the event trust is lost you still have an alternative
-- you can rehost and carry on. That's not true of services based on proprietary
software. If you stop trusting the provider, you'll need to migrate to a
completely different solution. These are just examples; there are more. The point
is that the behavior of the NSA and other government agencies is damaging
America's reputation, undermining business opportunity, and creating
opportunities abroad in areas that might be expected to be natural markets
for U.S. leadership. The impact of NSA intrusion on our civil liberties can't be
overstated, but the impact of this overreach on our technology businesses is
serious, too. It's time for change, both for our rights as citizens to be protected in the
way the Constitution intends, and to rebuild the reputation of America as a source of
trustworthy technology.
*NSA surveillance is killing US internet leadership
Forbes ’13. “NSA Snooping's Negative Impact On Business Would Have The Founding
Fathers 'Aghast'” Mieke Eoyang & Gabriel Horwitz. 12/20/2013
http://www.forbes.com/sites/realspin/2013/12/20/nsa-snoopings-negative-impact-onbusiness-would-have-the-founding-fathers-aghast/ //JJ
Second, what will this mean for the future of Internet governance? Since its earliest
days, the U.S.-based Internet Corporation for Assigned Names and
Numbers (ICANN) has governed the web. As the Internet has expanded, several
nations, especially China, have been pressing to end American dominance and transfer
control of Internet governance to the International Telecommunication Union (ITU), a
specialized agency within the United Nations. Worse still for prospects of
continued American dominance, the NSA revelations have prompted calls
for extensive regional control of the Internet. For example, Brazil, which has
long called for such regional control, will host an important Internet governance
conference in April that could challenge America’s role. Unless the U.S. government
takes steps to restore some degree of trust, the groundswell of international
interest in a new approach to Internet governance could undermine or end
U.S. Internet leadership. This could leave management of the Internet to nations
like China or Russia that do not share America’s commitment to safety, openness,
competition, and growth. Recommendations for change are coming from many
corners. President Obama’s advisory group on NSA reform is calling for an
end to bulk collection of Americans’ metadata and other steps to restore
protections abroad. Major Internet companies have called for greater
restrictions on surveillance activities, saying the balance has tipped too far
from the individual. The government should heed these calls for reflection and
reform. Without understanding the economic implications of our security policies and
taking reasonable steps to restore trust in America’s surveillance efforts, our Internet
dominance and our economy could pay the price.
Tech Off Shoring Ext
*Due to NSA concerns, companies are moving their operations
overseas
Harkness February 25, 2015. (Tim,“Offshoring data: Twitter moves non-US
accounts to Ireland” Lexology. Litigation partner based in New York Tim received his JD, cum
laude, from the University of Michigan, where he was Contributing Editor to the Law
Review, and his BA, cum laude, from Yale University.
http://www.lexology.com/library/detail.aspx?g=ea86ed3a-5777-45ef-999fda56fa0fa406 //JJ
Twitter has announced that, effective next month, its Dublin-based entity
will take over all services for non-US users. Accordingly, all non-US user data
will be moved to servers in Ireland and governed by Irish privacy and data
protection laws. By making this move, Twitter is taking the lead from other
major tech companies that have also recently offshored their non-US user
data to Ireland. The move has two main consequences: First, Twitter’s non-US
user data may now be beyond the reach of NSA surveillance programs. And
second, Ireland’s Data Protection Commissioner (one of the European
privacy regulators with a balanced approach to compliance and
enforcement), will assume responsibility for overseeing Twitter’s handling
of information for approximately 300 million users. Whether Twitter’s move of
non-US data to Ireland will shield it from US government warrants is an
issue that may be decided this summer in a New York appellate court.
Microsoft Corporation has challenged a warrant for its user data stored in Ireland,
arguing that the Stored Communications Act doesn’t apply to private data on foreign
servers. The government asserts that the foreign data targeted by the
warrant is fair game because, even though it is stored abroad, Microsoft has
control over the data and is based in the United States.
Key for Trade Ext
*If the US wants to ink a trade deal, it will alleviate fears of NSA spying
Motherboard ’14. “The World's Next Major Trade Agreement Will Make NSA Spying
Even Easier” July 16, 2014. Justin Ling. http://motherboard.vice.com/read/the-transpacific-partnership-will-make-nsa-spying-easier //JJ
With paranoia over NSA surveillance reaching a fever pitch, foreign
governments are making a reasonable plea: bring our data home. But the
Americans are doing their best to ensure that the world’s Internet data
stays on U.S. soil, well within the reach of their spies. To do so, American
negotiators are leveraging trade deals with much of the developed world,
inserting language to ensure “cross-border data flows”—a euphemism that
actually means they want to inhibit foreign governments from keeping data hosted
domestically. The trade deals they’re influencing—the Trans-Atlantic
Partnership (TPP), the Trade in Services Agreement (TiSA), and the
Transatlantic Trade and Investment Partnership (TTIP)—are all so
secretive that nobody but the governments themselves are privy to the
details. But thanks to the Australians and Wikileaks, both of whom have leaked details
on TPP, we have a pretty good idea of what’s going on in the latest Trans-Pacific
Partnership—a trade agreement that will act as a sort of NAFTA for Asia-Pacific region
nations. America is, essentially, the world’s data server. Since the dawn of
the internet itself, every database of import has been hosted in the grand US
of A. But now, foreign governments are starting to see the benefit of
patriating their citizens’ private information. Canada was an early adopter of the
idea. Federal procurement regulations often require government departments to insert
local data requirements, stating that businesses who wish to administer or host
Canadians’ information must keep the information within Canadian borders. Most
recently, the Canadian Government put out a tender for a company to merge and host
the email servers for all their departments. In doing so, they stuck in a national security
exemption, forbidding foreign contractors from applying. Nova Scotia and British
Columbia went a step further, flatly requiring any government-hosted personal data to
be physically located in Canada. Australia has taken similar steps, including setting up
firm requirements for how companies store offshore data. But the American
government is not having any of it and is using TPP negotiations to strongarm new provisions that favour American hosted data. “In today’s informationbased economy, particularly where a broad range of services are moving to ‘cloud’ based
delivery where U.S. firms are market leaders; this law hinders U.S. exports of
a wide array of products and services,” reads a report on Canada from the office of
the United States trade commissioner. The only reason the world is aware of the
provisions in TPP on data hosting, is because the Australian negotiators,
facing American insistence on the matter, leaked it to the press. Along with
the New Zealanders, the Aussies are proposing changes to the agreement to short-circuit
America’s proposal. The TPP negotiations are top-secret, and highly controversial. As
VICE reported earlier this month, provisions of the agreement could force American
anti-piracy provisions onto the signatory countries. “We know there is an ecommerce chapter and the general understanding is that the U.S. is
pressing for a provision that would bar the ability to require localization of
data,” says University of Ottawa professor Michael Geist, who is also the Canada
Research Chair in Internet and E-commerce Law. “That has big implications.” The
Americans aren’t even making secret their insistence on the matter. On the American
website for the trade deal, it clearly states there’s a priority for the TPP to
include: “requirements that support a single, global Internet, including
ensuring cross-border data flows, consistent with governments’ legitimate
interest in regulating for purposes of privacy protection.”
Solvency Ext
*Only tangible restrictions on the NSA will fix the problem
TF ’14 [Tech Freedom, April 1, 2014, TF, CDT, and 40 others tell Congress what real
NSA reform should look like, http://techfreedom.org/post/81391689035/tf-cdt-and40-others-tell-congress-what-real-nsa]
The White House has expressed support for reining in the NSA’s bulk
collection of Americans’ phone records, but with multiple bills in Congress it’s
uncertain which specific reforms will be included in the debate moving forward. To
ensure whichever NSA reform bill advances is as strong as possible,
TechFreedom and 41 other nonprofits and businesses have sent a joint letter to
key policymakers outlining what any bill aiming to reform bulk surveillance
should include. Read the text below, and see the full letter for the list of signatories
and recipients: We the undersigned are writing to express support for ending the
government’s bulk collection of data about individuals. We strongly urge swift markup
and passage of the USA FREEDOM Act (H.R.3361), which would enact appropriate
surveillance reforms without sacrificing national security. This letter focuses on
bulk collection, but overbroad NSA surveillance raises many more privacy
and security issues that Congress and the Administration should address.
We appreciate that Congress and the Administration are converging on consensus that
the National Security Agency’s (NSA) bulk *collection of telephone records must end.
Among other things, legislation on bulk collection should: Prohibit bulk
collection for all types of data, not just phone records. Section 215 of the
PATRIOT Act applies broadly to business records, and the Department of Justice has
claimed authority for bulk collection of any records that reveal relationships between
individuals. Legislation that focuses only on phone records may still allow for the bulk
collection of, for example, Internet metadata, location information, financial records,
library records, and numerous other records that may help “identify unknown
relationships among individuals.” Prohibit bulk collection under Section 214 as
well as Section 215 of the PATRIOT Act, or under any other authority. While
the NSA’s bulk collection of telephone records under the purported authority of Section
215 has received considerable attention, the NSA engaged in the bulk collection of
Internet metadata using the Pen/Trap authority under Section 214 until
2011. Legislation that focuses solely on Section 215 would still fail to
prohibit the bulk collection of phone and Internet metadata using Section 214, the
National Security Letter (NSL) statutes, or another authority. Require prior court
approval for each record request. Under current law, the government must
obtain approval from the FISA court before it can force private entities to
turn over records (in bulk or otherwise) under Sections 215 and 214 of the PATRIOT
Act. In addition, President Obama, in his January 17th policy announcement,
established that a judicial finding is required before the government can query the
phone records that the NSA collected in bulk. Congress should leave this key
safeguard in place. If there is concern that the FISA Court would move too
slowly to authorize domestic surveillance beforehand, then the solution
should be to provide the FISA Court with sufficient resources.
A2: Us Econ strong
Global economy on the brink now and it’s only getting worse
Daiber ‘14, freelance economic analysts
(Lee, “18 Signs That The Global Economic Crisis Is Accelerating As We Enter The Last
Half Of 2014,” Freedom Informant Network: Economy and Worldview,
http://www.freedominfonet.net/18-signs-global-economic-crisis-accelerating-enterlast-half-2014/)//JB
A lot of people that I talk to these days want to know “when things are going to start
happening”. Well, there are certainly some perilous times on the horizon, but
all you have to do is open up your eyes and look to see the global economic
crisis unfolding. As you will see below, even central bankers are issuing
frightening warnings about “dangerous new asset bubbles” and even the
World Bank is declaring that “now is the time to prepare” for the next
crisis. Most Americans tend to only care about what is happening in the United States,
but the truth is that serious economic trouble is erupting in South America, all
across Europe and in Asian powerhouses such as China and Japan. And the
endless conflicts in the Middle East could erupt into a major regional war at
just about any time. We live in a world that is becoming increasingly
unstable, and people need to understand that the period of relative stability that
we are enjoying right now is extremely vulnerable and will not last long.
The following are 18 signs that the global economic crisis is accelerating as
we enter the last half of 2014… #1 The Bank for International Settlements has
issued a new report which warns that “dangerous new asset bubbles” are
forming which could potentially lead to another major financial crisis. Do
the central bankers know something that we don’t, or are they just trying to place the
blame on someone else for the giant mess that they have created? #2 Argentina has
missed a $539 million debt payment and is on the verge of its second major debt
default in 13 years. #3 Bulgaria is desperately trying to calm down a massive
run on the banks that threatens of spiral out of control. #4 Last month,
household loans in the eurozone declined at the fastest rate ever recorded.
Why are European banks holding on to their money so tightly right now? #5 The
number of unemployed jobseekers in France has just soared to another
brand new record high. #6 Economies all over Europe are either showing
no growth or are shrinking. Just check out what a recent Forbes article had to say
about the matter… Italy’s economy shrank by 0.1% in the first three months of 2014,
matching the average of the three previous quarters. After expanding 0.6% in Q2 2013,
France recorded zero growth. Portugal shrank 0.7%, following positive
numbers in the preceding nine months. While figures weren’t available for Greece and
Ireland in Q1, neither country is showing progress. Greek GDP dropped 2.5% in
the final three months of last year, and Ireland limped ahead at 0.2%. #7 A few days
ago it was reported that consumer prices in Japan are rising at the fastest
pace in 32 years. #8 Household expenditures in Japan are down 8 percent
compared to one year ago. #9 U.S. companies are drowning in massive
amounts of debt, but the corporate debt bubble in China is so bad that the
amount of corporate debt in China has actually now surpassed the amount of
corporate debt in the United States. #10 One Chinese auditor is warning that up
to 80 billion dollars worth of loans in China are backed by falsified gold
transactions. What will that do to the price of gold and the stability of Chinese
financial markets as that mess unwinds? #11 The unemployment rate in Greece is
currently sitting at 26.7 percent and the youth unemployment rate is 56.8
percent. #12 67.5 percent of the people that are unemployed in Greece have
been unemployed for over a year. #13 The unemployment rate in the
eurozone as a whole is 11.8 percent - just a little bit shy of the all-time record
of 12.0 percent. #14 The European Central Bank is so desperate to get money
moving through the system that it has actually introduced negative interest
rates. #15 The IMF is projecting that there is a 25 percent chance that the
eurozone will slip into deflation by the end of next year. #16 The World
Bank is warning that “now is the time to prepare” for the next crisis. #17
The economic conflict between the United States and Russia continues to
deepen. This has caused Russia to make a series of moves away from the U.S. dollar
and toward other major currencies. This will have serious ramifications for the
global financial system as time rolls along. #18 Of course the U.S. economy
is struggling right now as well. It shrank at a 2.9 percent annual rate during the
first quarter of 2014, which was much worse than anyone had anticipated. But if
U.S. economic numbers look a bit better for the second quarter, that doesn’t mean that
we are out of the woods. As I have stressed so many times, the long-term trends and
the long-term balance sheet numbers are far, far more important than the
short-term economic numbers. For example, if you went to the mall today and
spent a thousand dollars on candy and video games, your short-term “economic activity”
would spike dramatically. But your long-term financial health would take a significant
turn for the worse. Well, when we are talking about the health of the U.S. economy or
the entire global financial system we need to keep the same kinds of considerations in
mind. As for the United States, whether the level of our debt-fueled short-term
economic activity goes up a little bit or down a little bit is not what is truly important.
Rather, the fact that we are nearly 60 trillion dollars in debt as a society is what really
matters. The same thing applies for the globe as a whole. Right now, the citizens of
the planet are more than 223 trillion dollars in debt, and “too big to fail”
banks around the world have at least 700 trillion dollars of exposure to
derivatives. So it doesn’t really matter too much whether the short-term economic
numbers go up a little bit or down a little bit right now. The whole system is an
inherently flawed Ponzi scheme that will inevitably collapse under its own
weight. Let us hope that this period of relative stability lasts for a while longer. It is a
good thing to have time to prepare. But you would have to be absolutely insane to
think that the biggest debt bubble in the history of the world is never going
to burst.
A2: NSA Trust
*The NSA paid off companies to weaken encryption so they could
create backdoors
Menn ’13. (Reporter for Reuters Magazine. Joseph Menn. “Exclusive: Secret contract
tied NSA and security industry pioneer” BY JOSEPH MENN. December 20, 2013.
http://www.reuters.com/article/2013/12/21/us-usa-security-rsaidUSBRE9BJ1C220131221 //JJ
As a key part of a campaign to embed encryption software that it could
crack into widely used computer products, the U.S. National Security
Agency arranged a secret $10 million contract with RSA, one of the most
influential firms in the computer security industry, Reuters has learned.
Documents leaked by former NSA contractor Edward Snowden show that the NSA
created and promulgated a flawed formula for generating random numbers
to create a "back door" in encryption products, the New York Times reported in
September. Reuters later reported that RSA became the most important
distributor of that formula by rolling it into a software tool called Bsafe that
is used to enhance security in personal computers and many other
products. Undisclosed until now was that RSA received $10 million in a deal
that set the NSA formula as the preferred, or default, method for number
generation in the BSafe software, according to two sources familiar with the
contract. Although that sum might seem paltry, it represented more than a third of the
revenue that the relevant division at RSA had taken in during the entire previous year,
securities filings show. The earlier disclosures of RSA's entanglement with the NSA
already had shocked some in the close-knit world of computer security experts. The
company had a long history of championing privacy and security, and it played a leading
role in blocking a 1990s effort by the NSA to require a special chip to enable spying on a
wide range of computer and communications products. RSA, now a subsidiary of
computer storage giant EMC Corp, urged customers to stop using the NSA formula after
the Snowden disclosures revealed its weakness. RSA and EMC declined to answer
questions for this story, but RSA said in a statement: "RSA always acts in the best
interest of its customers and under no circumstances does RSA design or enable any
back doors in our products. Decisions about the features and functionality of RSA
products are our own." The NSA declined to comment. The RSA deal shows one way
the NSA carried out what Snowden's documents describe as a key strategy
for enhancing surveillance: the systematic erosion of security tools. NSA
documents released in recent months called for using "commercial
relationships" to advance that goal, but did not name any security
companies as collaborators. The NSA came under attack this week in a landmark
report from a White House panel appointed to review U.S. surveillance policy. The panel
noted that "encryption is an essential basis for trust on the Internet," and called for a
halt to any NSA efforts to undermine it. Most of the dozen current and former
RSA employees interviewed said that the company erred in agreeing to such
a contract, and many cited RSA's corporate evolution away from pure
cryptography products as one of the reasons it occurred. But several said that
RSA also was misled by government officials, who portrayed the formula as a secure
technological advance. "They did not show their true hand," one person briefed on the
deal said of the NSA, asserting that government officials did not let on that they knew
how to break the encryption. STORIED HISTORY Started by MIT professors in the
1970s and led for years by ex-Marine Jim Bidzos, RSA and its core algorithm were both
named for the last initials of the three founders, who revolutionized cryptography. Little
known to the public, RSA's encryption tools have been licensed by most large technology
companies, which in turn use them to protect computers used by hundreds of millions
of people. At the core of RSA's products was a technology known as public
key cryptography. Instead of using the same key for encoding and then decoding a
message, there are two keys related to each other mathematically. The first, publicly
available key is used to encode a message for someone, who then uses a second, private
key to reveal it. From RSA's earliest days, the U.S. intelligence establishment
worried it would not be able to crack well-engineered public key
cryptography. Martin Hellman, a former Stanford researcher who led the
team that first invented the technique, said NSA experts tried to talk him
and others into believing that the keys did not have to be as large as they
planned. The stakes rose when more technology companies adopted RSA's methods
and Internet use began to soar. The Clinton administration embraced the Clipper Chip,
envisioned as a mandatory component in phones and computers to enable officials to
overcome encryption with a warrant. RSA led a fierce public campaign against the effort,
distributing posters with a foundering sailing ship and the words "Sink Clipper!" A key
argument against the chip was that overseas buyers would shun U.S.
technology products if they were ready-made for spying. Some companies say
that is just what has happened in the wake of the Snowden disclosures.
A2: Tech sector strong
*Due to concerns about the NSA, American companies are losing
billions
Miller ’14 (writer for the New York Times. March 21. 2014. “Revelations by Snowden
damage U.S. tech industry: Worried about privacy, foreign clients start to take business
elsewhere”. CLAIRE CAIN MILLER.
http://www.nytimes.com/2014/03/22/business/fallout-from-snowden-hurtingbottom-line-of-tech-companies.html /JJ
Technology companies abroad say they are gaining customers who are
shunning United States companies because of security concerns. Microsoft
has lost customers, including the government of Brazil. IBM is spending more than a
billion dollars to build data centers overseas in order to reassure foreign customers that
their information is safe from prying eyes in the United States government. And
technology companies abroad say they are gaining customers who are
shunning United States companies, suspicious because of the revelations by
Edward J. Snowden of the National Security Agency's vast surveillance
program. Even as Washington grapples with the diplomatic and political
fallout of Mr. Snowden's leaks, the more urgent issue, companies and
analysts say, is economic. It is impossible to see now the full economic ramifications
of the spying revelations -- in part because most companies are locked in multiyear
contracts -- but the pieces are beginning to add up as businesses question the
trustworthiness of American technology products. Meanwhile, the confirmation hearing
last week for the new N.S.A. chief, the appearance by video link of Mr. Snowden at a
technology conference in Texas and the drip of new details about government spying
have kept attention focused on an issue that many technology executives had hoped
would go away. "It's clear to every single tech company that this is affecting
their bottom line," said Daniel Castro, a senior analyst at the Information
Technology and Innovation Foundation, who predicted that the United States
cloud computing industry could lose $35 billion by 2016. Forrester, a
technology research firm, said the losses could be as high as $180 billion, or 25
percent of industry revenue, based on the size of the cloud computing, web hosting
and outsourcing markets and the worst-case scenario for damages. The business effect
of the Snowden revelations is felt most in the daily conversations between technology
companies with products to pitch and their wary customers. The topic of surveillance,
which rarely came up before, is "the new normal" in these conversations, as one
technology company executive described it. "We're hearing from customers, especially
global enterprise customers, that they care more than ever about where their content is
stored and how it is used and secured," said John Frank, deputy general counsel at
Microsoft, which has been publicizing that it allows customers to store their data in
Microsoft data centers in their own countries. At the same time, Mr. Castro said,
companies feel the United States government is only making a bad situation worse.
"Most of the companies in this space are very frustrated because there
hasn't been any kind of response that's made it so they can go back to their
customers and say, 'See, this is what's different now, you can trust us
again,"' he said. In some cases, that has meant forgoing potential revenue. Though it is
hard to quantify missed opportunities, American businesses are being left off some
requests for proposals from foreign customers who previously would have included
them, said James Staten, a cloud computing analyst at Forrester who has read clients'
requests for proposals. There are German companies, Mr. Staten said, "explicitly not
inviting certain American companies to join." He added, "It's like, 'Well, the very best
vendor to do this is IBM, and you didn't invite them."' The result has been a boon for
foreign companies. Brazil and Europe, which had used American undersea cables for
intercontinental communication, decided last month to build their own cable between
Brazil and Portugal and gave the contract to Brazilian and Spanish companies. The
Brazilian government also abandoned Microsoft Outlook for its own email system,
which uses Brazilian data centers. Runbox, a Norwegian email service that
markets itself as an alternative to American services like Gmail and says it
does not comply with foreign court orders seeking personal information,
reported a 34 percent annual rise in customers after the N.S.A. revelations.
Large European telecommunications companies like Deutsche Telekom of Germany
have introduced services like an email product that keeps users' data inside Germany in
direct response to customers' concerns about the N.S.A. scandal. Others like Orange of
France have seen an increase in business customers asking about privacy when
discussing potential cloud computing contracts. While the company's 15 data centers in
Europe, which has stronger data protection laws than the United States, are a major
selling point, Orange says it still has to provide services that compete with what
American rivals can offer. "The Snowden story is putting the pendulum between
European and American companies back into the middle," said Axel Haentjens, vice
president of cloud computing at Orange. "Before, the pendulum favored the
Americans. The competitive advantage is now more balanced." Mark J.
Barrenechea, chief executive of OpenText, Canada's largest software company, said an
anti-American attitude took root after the passage of the Patriot Act. But "the volume of
the discussion has risen significantly post-Snowden," he said. Of OpenText's clients, for
instance, a large German auto company required data to reside in Germany,
and a global steel manufacturer based in Britain demanded that its data not
cross United States borders. "Issues like privacy are more important than
finding the cheapest price," said Matthias Kunisch, a German software executive
who spurned United States cloud computing providers for Deutsche Telekom. "Because
of Snowden, our customers have the perception that American companies have
connections to the N.S.A." Security analysts say that ultimately the fallout from Mr.
Snowden's revelations could mimic what happened to Huawei, the Chinese
software company, which was forced to abandon major acquisitions and
contracts amid accusations by American lawmakers that the company's
products contained a backdoor for China's People's Liberation Army, even
though this claim was never definitively verified. Silicon Valley companies have
complained to government officials that their actions are hurting business. But
companies clam up on specifics about economic harm, whether to avoid frightening
shareholders or because it is too early to produce concrete evidence. "The companies
need to keep the priority on the government to do something about it, but they don't
have the evidence to go to the government and say billions of dollars are not coming to
this country," Mr. Staten said. Some American companies say the business hit has been
minor at most. John Chambers, the chief executive of Cisco Systems, said in an
interview that the N.S.A. disclosures had not affected Cisco's sales "in a major way."
Although deals in Europe and Asia have been slower to close, he said, they are still being
completed -- an experience echoed by several other computing companies. Still, the
business blowback can be felt in other ways than lost business. Security analysts say
technology companies have collectively spent millions and possibly billions
of dollars adding state-of-the-art encryption features to consumer services,
like Google search and Microsoft Outlook, and to the cables that link data
centers at Google, Yahoo and other companies. IBM said in January that it
would spend $1.2 billion to build 15 new data centers, including centers in London,
Hong Kong and Sydney, Australia, to lure foreign customers who are sensitive about the
location of their data. Salesforce.com announced similar plans this month.
Meanwhile, lawmakers in Germany and Brazil are considering legislation
that would make it costly or even technically impossible for American
technology companies to operate inside their borders. In Brazil, for example, a
proposed law would require that Brazilian users' data be kept in data centers in the
country. If it passes, companies like Google "could be barred from doing
business in one of the world's most significant markets," said Richard Salgado,
director of law enforcement and information security at Google. The company has said it
is technically nearly impossible to provide its services without sending data crisscrossing
the globe. Some government officials say laws like this could have a motive other than
protecting privacy. "Localization of data means more business for local
companies," Richard Clarke, the former United States cyberchief, said last month.
2AC
Case Extensions
Inherency
O/V
Extend the savage 15 evidence because the USA Freedom Act
does nothing to curtail warrentless wiretapping so NSA
overreach is still happening in the status squo
Extend the Wheeler 14 evidence- The NSA is violating it’s
agreement under the FAA and stealing data from yahoo and
google this causes tech companies to fight back against their
government and is hurting the US’s key role as a leader in
internet freedom
Generic
NSA reforms are insufficient and place too much of a burden on the
telecommunication industry
Francis 15
David Francis award winning staff writer writing for Foreign Policy June 5, 2015. “With
the Passage of NSA Reforms, Telecoms Say the Buck Has Been Passed to Them”
http://foreignpolicy.com/2015/06/05/with-the-passage-of-nsa-reforms-telecoms-saythe-buck-has-been-passed-to-them/ //EM
The two-year fight to overhaul the National Security Agency ended this
week with President Barack Obama’s signing of the USA Freedom Act. But it
will take months of tough negotiations with telecom companies for the
White House to actually implement the required reforms, and privacy groups are still
smarting over what they consider watered-down changes to how the NSA does business. The bill requires telecom
companies to store U.S. phone data instead of the NSA, which can access it with a warrant
from the Foreign Intelligence Surveillance (FISA) Court. Right now, telecom companies only store
this information for 18 months. This presents an immediate problem — and an
unfunded mandate — that the Obama administration and communications firms must work out during the six-month grace period
permitted by the bill: The
NSA wants data stored for five years. Former federal prosecutor Robert
Cattanach told FP he expects the White House and companies like AT&T to be able to come to terms on storage length. The
more challenging problem is that cell phone providers don’t store all of the
metadata on phone usage that the NSA does. During the years-long debate
over surveillance reform, cellular providers quietly pushed back at adding
capacity simply because the NSA wants it. Jot Carpenter, vice president of government affairs for
CTIA-The Wireless Association, a group that represents cell-phone companies, said cell providers are opposed
to adding any additional data collection on behalf of the NSA. It could cost
$60 million alone for the phone companies to get existing data from the
NSA. “I don’t know if the telecoms are going to start aggregating and retaining info from wireless companies they don’t otherwise
retain,” Cattanach said. “Both the telecoms and the NSA, they can each make each others lives miserable.” Meanwhile,
privacy groups that have been pressing lawmakers for reform since Edward
Snowden revealed NSA’s secrets to the world also walk away disappointed.
Their main point of contention is that the bill failed to address Section 702
of the Patriot Act, which sweeps up data on non-U.S. citizens outside of the
United States. Advocates say this provides a backdoor to collecting
American data. “It’s not a win, but we didn’t lose,” Daniel Schuman, policy director of the progressive group Demand
Progress, said Thursday. “It wasn’t an entire sellout to the intelligence community.” Reauthorization for Section 702 expires in two
years, meaning the debate over the NSA surveillance tools is far from over. Nadia Kayyali, an activist with the digital privacy
advocates the Electronic Frontier Foundation — a group who withdrew their support for the USA Freedom Act because it didn’t go
far enough to curb the NSA — said efforts are already underway to get lawmakers to kill the authority prior to its expiration.
Freedom Act
USA Freedom Act is actually an overall net benefit for the NSA;
this makes plan even more critical
Harris 15
Shane Harris, winner of a Gerald R. Ford Prize for Distinguished Reporting writing for
the The Daily Beast May 14, 2015. “‘Big Win’ for Big Brother: NSA Celebrates the Bill
That’s Designed to Cuff Them”
http://www.thedailybeast.com/articles/2015/05/14/nsa-loves-the-nothing-burgerspying-reform-bill.html //EM
Civil libertarians and privacy advocates were applauding yesterday after the
House of Representatives overwhelmingly passed legislation to stop the
National Security Agency from collecting Americans’ phone records. But
they’d best not break out the bubbly. The really big winner here is the NSA. Over at its headquarters in
Fort Meade, Maryland, intelligence officials are high-fiving, because they know things could have turned
out much worse. “What no one wants to say out loud is that this is a big win
for the NSA, and a huge nothing burger for the privacy community,” said a
former senior intelligence official, one of half a dozen who have spoken to
The Daily Beast about the phone records program and efforts to change it.
Here’s the dirty little secret that many spooks are loath to utter publicly, but have been admitting in private for the past two years:
The program, which was exposed in documents leaked by Edward Snowden
in 2013, is more trouble than it’s worth. “It’s very expensive and very
cumbersome,” the former official said. It requires the agency to maintain
huge databases of all Americans’ landline phone calls. But it doesn’t
contribute many leads on terrorists. It has helped prevent few—if any—
attacks. And it’s nowhere near the biggest contributor of information about
terrorism that ends up on the desk of the president and other senior
decision makers. If, after the most significant public debate about balancing
surveillance and liberty in a generation, this is the program that the NSA
has to give up, they’re getting off easy. The bill that the House passed
yesterday, called the USA Freedom Act, doesn’t actually suspend the phone
records program. Rather, it requires that phone companies, not the NSA,
hold on to the records. “Good! Let them take them. I’m tired of holding on to this,” a current senior U.S. official told
The Daily Beast. It requires teams of lawyers and auditors to ensure that the NSA is complying with Section 215 of the Patriot Act,
which authorizes the program, as well as internal regulations on how the records can and can’t be used, he said. The phone records
program has become a political lightning rod, the most controversial of all the classified operations that Snowden exposed.
If
the NSA can still get access to the records but not have to hold on to them
itself, all the better, the senior official said. “It’s a big win for common sense
and for the country,” Joel Brenner, the NSA’s former inspector general,
told The Daily Beast. “NSA can get to do what it needs to do with a higher
level of scrutiny and a little more trouble, but it can do what needs to do. At
same time the government is not going to hold the bulk metadata of the
American people.” “What no one wants to say out loud is that this is a big win for the NSA, and a huge nothing burger
for the privacy community.” “The NSA is coming out of this unscathed,” said the former
official. If the USA Freedom Act passes the Senate—which is not a foregone conclusion—it’ll be signed by President Obama and
create “a more efficient and comprehensive tool” for the NSA. That’s because under the current regime, only
the logs of landline calls are kept. But in the future, the NSA would be able
to get cell phone records from the companies, too. “That’s great,” the former official said. “I
think no one thought it was in the realm of the possible before this bill.” And
there’s another irony. Before the Snowden leaks, the NSA was already looking for
alternatives to storing huge amounts of phone records in the agency’s
computers. And one of the ideas officials considered was asking Congress to
require phone companies to hang onto that information for several years.
The idea died, though, because NSA leaders thought that Congress would never agree, current and former officials have said. Enter
Snowden. Suddenly the NSA found itself under orders from the White House to come up with some alternative to the phone records
program that preserved it as a counterterrorism tool, but also put more checks on how the records are used. That’s
when
General Keith Alexander, then the agency’s director, dusted the old idea off
the shelf and promoted it on Capitol Hill. “The USA Freedom Act”—the
supposed reining in of the NSA—“was literally born from Alexander,” the former
official said. So the NSA effectively got what it wanted. But that doesn’t mean privacy activists got
nothing, or that they’d count the law’s passage as a loss. Consider their significant victories. Before Snowden, the NSA was secretly
collecting records on hundreds of millions of Americans, a program that some members of Congress didn’t even understand they
were voting for when they renewed the Patriot Act, and that an appeals court ruled last week is illegal. Now the world knows what
the agency exposed hundreds of millions of innocent people to potential scrutiny. “These are reforms NSA ultimately was prepared
to accept; it’s not as though the agency had been secretly wishing for these changes all along and was finally able to get them only
now,” Julian Sanchez, a senior fellow at the Cato Institute, told The Daily Beast. “So it seems a little odd to call it a ‘win’ for them.”
“But,” Sanchez continued, “I’d certainly agree it’s not a loss for NSA in any meaningful way.
Indeed, there are
some respects in which a shift to the carrier-centric model is likely to give
them greater flexibility by allowing them to query on data the FISC order
doesn’t permit them to collect.” For instance, billing addresses, which the
NSA database doesn’t have now, but that the phone companies could, in
principle, provide. The FISC is the Foreign Intelligence Surveillance Court, which has been secretly authorizing the
program for years. Under the new law, the NSA would have to get court approval to query the phone records. That adds
another layer of oversight to the intelligence operations, but it doesn’t
suspend them. And there’s no guarantee it would curtail them, either. The
court has repeatedly found that the phone records program is legal.
Presumably it’s not going to stop granting NSA’s requests just because the
records now sit in an AT&T database instead of one owned by the U.S.
government. “The NSA is coming out of this unscathed... No one thought it was in the realm of the possible.” But the NSA is
not out of the woods, because surveillance critics don’t see the USA Freedom Act as the last chapter. “The only downside for privacy
advocates would be if the passage of this bill were invoked to claim we’ve now accomplished ‘surveillance reform’ and there’s no
work left to be done,” Sanchez said. Now, advocates will turn their sights on another controversial portion of surveillance law,
Section 702 of the Foreign Intelligence Surveillance Act. That’s what lets the NSA collect email and other electronic data from big
tech companies like Google, Facebook, and Yahoo, including under the so-called Prism program that was the subject of the second
big leak from Snowden. That program does provide the NSA with a huge amount of information. According to intelligence officials,
it’s the single largest source of intelligence included in the president’s daily national security briefing. And it also allows the NSA to
collect large amounts of global communications as they course through equipment in the United States. Take those authorities away,
and it’d be like putting out one of the NSA’s eyes. Section 702 is slated to sunset in 2017. If members of Congress and privacy
activists mount an effort to restrict or repeal those authorities, the NSA will go to the barricades to stop them. But that’s another day.
For now, the NSA is taking its lumps, and thanking its lucky stars.
USA Freedom Act does not alter perceptions of US surveillance
Knibbs 15
Kate Knibbs Bachelor's of Arts, English major, and Political Science minor from McGill
University writing for Gizmodo June 3, 2015. “Obama Took a Tiny Step Towards
Reform By Signing the USA Freedom Act” http://gizmodo.com/congress-just-took-ababy-step-towards-limiting-governm-1708547987 //EM
After a tense battle over renewing key provisions of the Patriot Act, the US Senate passed the USA Freedom Act, a bill meant to limit
the government’s surveillance apparatus. President Obama signed the bill last night. The USA Freedom Act renews Section 215 of
the Patriot Act, which has been used (under dubious legal circumstance) to justify the NSA’s bulk metadata collection program. In
renewing Section 215, the bill prohibits the NSA from using it to justify its bulk data collection program. The bill also declassifies
major FISA court opinions, throwing an extra iota of sunshine on a shadowy corner of the legal system. After Congress blew its
deadline and Section 215 “sunsetted” this weekend, the Senate got serious about compromising, with hardcore Patriot Act supporter
and former USA Freedom opponent Sen. Mitch McConnell (R-Ky.) flipping his vote, preferring to support legislation he didn’t like
rather than see Section 215 go away completely. McConnell attempted to insert a few amendments into the USA Freedom Act to
water it down, but none passed. Still, the bill is seen as a big compromise for privacy activists, since the limits it places on
surveillance don’t bring sweeping reform. Privacy-minded
groups weren’t uniformly
supportive of the bill, with many concerned it didn’t go far enough. “This
bill would make only incremental improvements, and at least one
provision—the material-support provision—would represent a significant
step backwards,” ACLU deputy legal director Jameel Jaffer said in a
statement while it went through Congress. “The disclosures of the last two
years make clear that we need wholesale reform.” And while supporters like Sen. Ron Wyden
(D-Ore.) voted for and praised the bill, there’s recognition that it’s an incremental victory at best. “The fight to protect Americans’
constitutional rights against government overreach is not over,” Wyden said in a statement. “I’m
committed to
plugging the backdoor search loophole that the government uses to review
Americans’ communications without a warrant, to beat back efforts to build
security weaknesses into our electronic devices and to require the
government to get a warrant before tracking Americans’ movements
electronically.” This is a good step towards reform! The bill might seem like a strident win because of the Congressional
strife it caused, but it’s important to remember that it’s just a tiny little baby step,
and not any kind of blanket protection against continued intelligence
overreach.
Multistakeholder Model
2AC-O/V
Group the Eoyang 14 and Kehl 14 cards- The belief that the NSA
is using the Executive order 12333 to go around section 702 of
the FAA is costing the tech industry millions and leading to a
disconnect with the intelligence community, this specifically
hampers the United State’s ability to uphold the Internet
Freedom Agenda and would lead to global data localization.
Multistakeholderism
Multi-Stakeholder Good
Multi-Stakeholderism encourages innovation and risks are
mitigated through private sector investment
Berejka was Senior Advisor for Technology Policy ’12 ( Marc Berejka was Senior Advisor
for Technology Policy to the U.S. Secretary of Commerce from 2009 to 2011, “A CASE FOR
GOVERNMENT PROMOTED MULTI-STAKEHOLDERISM”, p. 2-3, Heinonline)//KY
The prominence of the Internet in today's society and the persistence of
certain challenges online provide good justification for greater
governmental engagement. Looking more deeply and, in particular, by
building on lessons from Complexity Theory, 3 this paper offers more
fundamental reasons for employing a multi-stakeholder strategy.
Observations from Complexity Theory suggest that we can improve welfare
at the individual and societal level by building up mutual trust over time. 4
Extrapolating, the multi-stakeholder framework fleshed out here is
consciously aimed at cultivating formal and informal institutions that focus
on fostering trust among industry, civil-society, and government
stakeholders. Complexity Theory also reminds us of the impossibility of
predicting future innovations. Therefore, the multi-stakeholder framework
eschews rules and rulemaking that might dampen innovation. Instead, it
urges policymakers to identify the public imperatives they wish to protect at
a high, principles-based level. Using those principles as a foundation,
stakeholders ought to then convene themselves to develop context-specific
methods for meeting the imperatives. Institutions, whether governmentally led or
not, must be able to detect and deter cheating against the agreed-upon goals
to maintain trust in the system. Finally, lessons from such oversight should
be fed back into the norm development process to keep practices up to date.
There are several risks to the success of multi-stakeholderism. To a great
extent, those risks can be mitigated by deep investment, largely from the
private sector. The overarching point is that a new paradigm such as the one outlined
here is necessary if we are to continue to enjoy the fruits of Internet-based innovation
while at the same time avoiding the threat
Multi-Stakeholderism creates incentives for collaboration
Antonova Professor of Management and International Business ‘7(Slavka Antonova,
p.12-13, “Power and Multistakeholderism in Internet Global Governance. Towards a
synergetic theoretical framework”, Massey University, 2007,
http://muir.massey.ac.nz/bitstream/handle/10179/653/pmig2007.pdf?sequence=1)
//KY
In response to the need for a more dynamic process-oriented mode of
investigation in inter-organizational relations, Barbara Gray (1989) developed
an empirical theory of (multistakeholder) collaboration. It combined perspectives of
organizational behavior and political science, and departed from the traditional model
of inter-organizational relations that had hitherto dominated the literature. Gray
suggested that collaboration was enabling organizations to manage their increasing
interconnectedness (Gray, 1989, p. 226). In a collaboration, stakeholders
“constructively explore their differences”. The aim is “to create a richer, more
comprehensive appreciation [common understanding] of the problem… than any one of
them could construct alone” (Gray, 1989, p. 5), and resolve conflicts, or advance shared
visions on the collective good (Gray, 1989, p. 5).14 As Gray noticed, dissatisfaction with
the status quo, and the desire to avert unwanted costs that it induces, constitute a
major motivation for the principal stakeholders to turn to collaboration.
There are stakeholders, though, who would be prompted to join a collaboration because
of the attractive cultural norms it embodies (consensus decision-making vs.
topdown governmental regulation), or the credibility of the convening party(ies). Thus,
the expectation that through collaborative efforts some positive outcomes would be
produced is a powerful incentive for participation in a collaboration.
Multi-Stakeholder governance is key to a free, open and robust
internet
Stacy Physical Science News Officer @ Brown 2/13 (Kevin Stacy is a Physical Science
News Officer, Brown News, “Multistakeholder governance for the global Internet”,
2/13/15, https://news.brown.edu/articles/2015/02/savage) //KY
The governance debate over the last year or so has largely boiled down to
two camps. The U.S. and Western governments endorse a multistakeholder
model, one in which Internet policy is set collectively by representatives
from technology, business, and public policy sectors. On the other hand, Russia,
China, and other nations favor turning control of the Internet over the
United Nations under the auspices of the International
Telecommunications Union. The ITU option would put world governments
in control of the Internet, with each nation having one vote. While the “one nation,
one vote” model may sound healthy and democratic, putting governments in
charge of the Internet could have troubling consequences, Savage says. “The
Internet’s capacity to empower individuals has caused a lot of governments
to become alarmed. If they have the chance, many governments — potentially a
majority of them — would prefer to limit the free flow of information and
ideas. That would have negative consequences for individuals, businesses, and the
scientific community.” The best option for maintaining a free, open, and
robust Internet, Savage argued, is a multistakeholder model of some kind. The
problem, however, is that the concept of “multistakeholder” is often loosely
defined. “It’s a very fuzzy idea,” Savage said. “Advocates have expressed a
desire for decisions to be made in a way that’s open, transparent, and
inclusive, but beyond that there’s little conception of what a
multistakeholder model would actually look like.” Further complicating
matters is the huge breadth of issues involved in governing the Internet. For
some, Internet governance refers to the technical operations of the network,
including traffic routing and domain names. For others, it means regulating
content, combating cybercrime and terrorism, or protecting freedom of
expression online. In a recent paper, Savage and co-author Bruce McConnell
outlined some broad recommendations for what shape multistakeholder
governance might take. First, they suggested not conflating all aspects of
Internet governance under one organization. “The likelihood of reaching
agreement increases if we can simplify the landscape,” Savage said. “That means
disaggregating governance into a small set of important issues.” In many
cases, he argues, existing international organizations could be brought to
bear in dealing with nontechnical public policy issues related to the
Internet. “So many of the issues people are looking to govern predate the
Internet — crime, human rights terrorism, et cetera. For human rights, there exists the
Human Rights Council. For crime, there exists Interpol. We think that these
existing organizations should deal with those governance matters that fall
within their respective areas.” One problem is that many of these
organizations might not be up to speed on the Internet. But that’s easily
remedied, Savage says. Each group could assemble a multistakeholder
advisory panel of Internet experts to help guide decision-making. Technical
issues including network architecture, domain names, and the like, could also be
handled by a model that involves multistakeholder oversight, Savage says. But
care must be taken to make sure that technical decisions are ultimately made by those
most qualified to do so. For example, the Internet Corporation for Assigned
Names and Numbers (ICANN) has successfully expanded the domain name system
to more than 3 billion users. There’s no reason it should not continue to do so,
but adding a properly crafted multistakeholder oversight panel could
bolster ICANN’s legitimacy. Such a panel should operate on the principle that
policymakers can offer opinions concerning technical decisions, but that those with
technical expertise should make final decisions on them. “We think that a model of
decentralized governance with multistakeholder oversight is a plausible
structure for governing the Internet,” Savage said. “It’s a way of
strengthening the multistakeholder model, which we think is key to
maintaining a free, open, safe and robust Internet.”
Multi-Stakeholderism provides the necessary model for cooperation to
prevent global internet separation
Hill Internet Policy at U.S. Department of Commerce ’12 (Jonah Force Hill works in
Internet Policy at the U.S. Department of Commerce and was a research assistant at the
Harvard – Belfer Center, Harvard – John F. Kennedy School of Government, “Internet
Fragmentation Highlighting the Major Technical, Governance and Diplomatic
Challenges for U.S. Policy Makers”, Spring 2012,
http://ecir.mit.edu/images/stories/internet_fragmentation_jonah_hill.pdf)//KY
The Internet allows for the rapid and inexpensive collection of vast
amounts of personal information and data online. Internet companies and
ISPs collect users’ information through searches, purchases, sign-ins, and
HTTP cookies, and then use that information for any number of purposes,
from improved search engine results to better-targeted advertising. But
while the collection of personal information and data has generated billions of dollars of
online revenue and spawned new industries,120 privacy advocates around the
world are up in arms about the collection and use of this data, and what they
view as a mounting threat to personal privacy and a lack of serious online consumer
protections. In response to these concerns, governments are crafting new rules
addressing how digital data are collected, stored and sold. Whether privacy protections
should be enforced through legislation, or through voluntarily measures by
Internet companies, is a matter of intense debate. But if the recent wave of
new proposed privacy rules in the U.S. and internationally is any indication, the
tide of public and government opinion seems to be shifting towards
increased legal protections for Internet users and their personal
information. Hidden within these privacy deliberations, however, lies a real threat
to the Internet’s unity. Amidst the flurry of new privacy legislation under
discussion in world capitals, there has been remarkably little international
coordination or agreement about what types of restrictions and limitations should be
put on the acquisition and use of online data. There are mounting concerns that if many
countries adopt their own unique privacy requirements, then every firm operating
on the Internet could potentially be subjected to a multiplicity of often
inconsistent laws. If companies are unable to meet each country’s differing
requirements, either because those requirements are in conflict with one another or
because of the added costs associated with meeting multiple disparate rules, then we
could see firms pulling out of particular markets entirely, essentially balkanizing the
Internet by firm.
Multi-Stakeholderism is key to prevent silencing of free
expression
Clingaert Vice-president for policy and external relations at Freedom House ’11
(Daniel Calingaert is vice-president for policy and external relations at Freedom House,
which receives funding from the State Department, Google, and other sources to
promote Internet freedom. He also teaches in Georgetown University’s M.A. Program in
Democracy and Governance and at Johns Hopkins University’s School of Advanced
International Studies, Stanford CDDRL, “CHALLENGES FOR International Policy”,
7/12/11,
http://cddrl.fsi.stanford.edu/sites/default/files/calingaert_challenges_for_internation
al_policy_0.pdf)//KY
The Obama administration has developed a sophisticated, multifaceted policy to
protect and advance Internet freedom. This policy reflects a serious U.S.
commitment to support online freedom of expression and to push back on
the restrictions imposed by authoritarian regimes. It promotes respect for
international human-rights principles of free expression, defends the open
multistakeholder structure of global Internet governance, supports digital
activists, and makes substantial funding available to develop and apply new
technologies to curb Internet censorship and surveillance. The Dutch and
Swedish governments have launched similar policy initiatives and led the debate in the
European Union to step up efforts to promote Internet freedom. Current international
policy on Internet freedom, however, is insufficient to stem the rising tide of
authoritarian censorship and control over digital media and
communications around the world. The proliferation of these controls is
outpacing the efforts of citizens and democratic governments to expand the
space for free expression on the Internet. The United States and the EU can have
greater impact in their efforts to push back against Internet-related repression by
challenging restrictive Internet laws and practices abroad, standing up for technology
companies that are pressured into assisting authoritarian regimes with Internet
censorship or surveillance, and enacting legislation to curb sales of U.S. and
European technology that is used to violate human rights.
AT: Authoritarian countries support Multistakeholderism
Authoritarian multi-stakeholderism differs from current multistakeholder implementations – gives governments sole power
over the internet
Dourado Director of Technology Policy Program @ George Mason U ’13 (Eli Dourado is
a research fellow at the Mercatus Center at George Mason University and director of its
Technology Policy Program, ForeignPolicy, “Too Many Stakeholders Spoil the Soup” , 5/15/13,
http://foreignpolicy.com/2013/05/15/too-many-stakeholders-spoil-the-soup/)//KY
Authoritarian governments have been quick to remind the world that they
are stakeholders, too. Since the Tunis Agenda urges all stakeholders to work
together "in their respective roles," the most illiberal countries have simply
argued that national governments should have the biggest and most preeminent roles, while other stakeholders should have smaller subordinate
ones. Russia in particular is aggressively pushing this definition for the role
of governments. Its proposed edits to the multi-stakeholder opinion invites
member states "to exercise their rights on Internet Governance … at the
national level," by which it means that national governments should
preempt ICANN. In other words, Russia — and its allies like China and Saudi
Arabia — are adopting the language of multi-stakeholderism to support
something rather like its opposite. The position they are advancing is
virtually indistinguishable from one which accords no role to other
stakeholders.
China
China cooperating with 14 other countries for governmental
control of the internet
Seghal Council of Foreign Relations ’14 (Adam Seghal is on the Council of Foreign
Relations, Indiana University, “A Field of Intense Struggle: China and the International
Politics of the Internet, Cyberspace, and Cybersecurity”, Spring 2014,
http://www.indiana.edu/~reeiweb/newsEvents/2014/Segal_response.pdf)//KY
Chinese officials frame network security as a global problem that requires international
cooperation, but while the United States, United Kingdom and other liberal democracies
prefer a multistakeholder model of Internet governance, China supports a more
state-centric approach anchored in the United Nations and the
International Telecommunications Union. In a 2013 speech, Lu Wei of the State
Internet Information Office argued that information services could cross borders, “but
cyberspace cannot live without sovereignty.”6 States should proceed from the principles
of the UN Charter, and Lu suggested that China would work with others to
develop a multilateral framework for the governance of the Internet under
the UN. 3 On questions of international law and cybersecurity, the United States and
the United Kingdom have consistently argued that cyberspace should not be considered
an entirely new domain and that the laws of armed conflict (proportionality and
neutrality, for example) apply. Chinese analysts by contrast have stated that
international law has not kept up with technological changes, that it is too narrow, and
that it should be supplemented with new treaties, including perhaps arms
control treaties for cyber weapons. In June of 2013, China, along with
fourteen other countries, signed off on a report by UN Group of Government
Experts (GGE) that argued “international law, and in particular, the United Nations
Charter” applies to cyberspace and that there was a norm of state responsibility—states
must meet their international obligations regarding internationally wrongful acts
attributable to them.7 Since the report’s publication, the State Department has tended
to stress the perceived consensus around international law and state responsibility. In
contrast, the public statements by Chinese officials have centered on the norms of state
sovereignty. For many Chinese analysts, the overall security trends are negative.8
New technologies mean new threats, and the impact of cyber events is growing.
The United States, Australia, UK, India, and Canada have used security concerns to
block the import of Chinese products. Western countries, and the United States in
particular, are increasing their “Internet containment of China” through diplomatic
efforts such as cyber defense consultations with Japan, South Korea, and Australia.
Spending on cyber offense by the Pentagon is increasing, and the Snowden revelations
have reinforced the sense that the United States occupies the preeminent position in
cyberspace. These challenges give a sense of Chinese policy priorities over the next five
years. The development of domestic technology and indigenous innovation will remain
critical. Within China, the institutional, legal, and policy frameworks for
cybersecurity must be developed. Some analysts have also called for the public
development of active defense and offensive capabilities. There is also a sense that China
needs to step up its international efforts to promote the concept of national sovereignty
in cyberspace within the UN framework. In short, many in China are likely to see the
country engaged in intense competition with the liberal democracies. Or as Major
General Wu Jiangxing, the president of the PLA Information Engineering University,
put it in an interview: “Cyberspace has become a field of intense struggle, and the state,
government, and army must take extraordinary measures to enhance its security.”
China cooperating with other countries to push governmental
control of the internet
Shackelford et al 6/25 (Scott J. Shackelford, JD, PhD is an Assistant Professor of
Business Law and Ethics at Indiana University. He is a Senior Fellow at the Indiana
University Center for Applied Cybersecurity Research and the W. Glenn Campbell and
Rita Ricardo-Campbell National Fellow at the Stanford University Hoover Institution.
Enrique Oti is a National Security Affairs Fellow at the Stanford University Hoover
Institution. Jaclyn A. Kerr is a Cybersecurity Postdoctoral Fellow at Stanford
University’s Freeman Spogli Institute. Elaine Korzak, LLM, PhD is a Cybersecurity
Postdoctoral Fellow Stanford University’s Freeman Spogli Institute. Andreas Kuehn is a
Zukerman Cybersecurity Predoctoral Fellow Stanford University’s Freeman Spogli
Institute, Georgetown Journal of International Affairs, “SPOTLIGHT ON CYBER V:
BACK TO THE FUTURE OF INTERNET GOVERNANCE?”, 6/25/15,
http://journal.georgetown.edu/back-to-the-future-of-internet-governance/)//KY
China has not changed its positions on promoting cybersecurity as a subset
of national sovereignty since WCIT-12, nor on establishing an international
Internet management system, but it seems to be modifying its tactics. The
Chinese government first formalized its desire for a new Internet
governance mechanism in 2006 when it drafted the “2006-2020 National
Strategy for Informatization Development.”[22] In this document, China
made clear that in order to enable domestic Internet development and
cybersecurity, they needed to actively engage in international exchanges in
order to “contribute to building up an international Internet management
mechanism characterized by sovereign equality among different
countries.”[23] Over the next six years, China continued to refine its
position. In its 2010 white paper, “The Internet in China,” the government
declared, “China holds that the role of the UN should be given full scope in
international Internet administration. China supports the establishment of
an authoritative and just international Internet administration
organization under the UN system through democratic procedures on a
worldwide scale.”[24] This position was translated into action in 2011 when
China, Russia, Tajikistan, and Uzbekistan jointly proposed a UN resolution
that encouraged “the establishment of a multilateral, transparent and
democratic international Internet management system,” and promoted
“the important role of the United Nations in formulating international
norms, peaceful settlements of international disputes and improvements in
international cooperation.”[25]
Russia
Russia is leading other governments towards governmental
control model for the internet
Dourado Director of Technology Policy Program @ George Mason U ’13 (Eli
Dourado is a research fellow at the Mercatus Center at George Mason University and
director of its Technology Policy Program, The Guardian, “So Much for America's
Internet Freedom Agenda” , 8/7/13, http://mercatus.org/expert_commentary/somuch-americas-internet-freedom-agenda)//KY
The National Security Agency's surveillance of innocent Americans without
a warrant is illegal and unconstitutional. In a narrowly defeated amendment,
congressman Justin Amash (a Michigan Republican) and a bipartisan group of over 200
members of Congress recently voted to defund the NSA's warrantless spying on US
citizens. But obscured by the debate over domestic spying is the fact that
virtually no one in the United States is questioning the NSA's total
surveillance of the rest of the world. Foreign surveillance programs, unlike
domestic ones, are clearly legal and constitutional, but that doesn't make them
good policy. After all, most of the nearly seven billion non-Americans in the
world are just as innocent as most Americans. They resent US government
surveillance as much as, or perhaps more than, Americans do. To see how foreign
resentment over surveillance is hurting US interests, look at the international
politics of internet governance. Unsavory regimes have long sought a
preeminent role for the United Nations on internet matters. This past
December in Dubai, the United States and many of its allies refused to sign a
UN telecommunications treaty that would have implicated the internet in
part on the grounds that it would have harmed Internet freedom. Led by
Russia, some regimes want to split the internet into 193 separate "states"
(pdf), managed by national governments, which interconnect according to
the rules of a treaty. These countries want such arrangements because they want to
more effectively surveil and censor their own citizens. The US State Department
always rightly opposed such activities, but now that leaked documents are
revealing the NSA's domestic and global surveillance programs, the United States
looks hypocritical. One can come up with all kinds of excuses for why US
surveillance is not hypocrisy. For example, one might argue that US policies
are more benevolent than those of many other regimes, which is true. And
one might recognize that in several cases, some branches of government don't
know what other branches are doing – also true – and therefore US policy is
not so much hypocritical as it is inadvertently contradictory. Fine. But the
fact is that the NSA is galvanizing opposition to America's internet freedom
agenda. The scandal is reinvigorating Russian proposals for the
International Telecommunication Union, a UN agency, to take over internet
technical standards and management of the domain name system. Brazil
insists that the role of governments and intergovernmental agencies in
managing the internet be discussed at ITU meetings in November and
March. These are not major policy changes, but they now find a more
sympathetic ear from the developing countries that make up the majority at
the ITU, which conducts business on the basis of one vote per country. In truth, most
developing countries don't care very much about the management of the
internet per se. What they really want is more access to the internet – more
foreign investment and more aid to set up internet exchange points. In the
past, the United States always offered more development resources as a way
to smooth over its hard-line stance on preserving existing Internet
institutions. But now, developing countries don't want US assistance because
they assume the equipment comes with a backdoor for the NSA. They are
walking straight into the arms of Russia, China, and the ITU, and when the
time comes to decide how the internet should be managed, who do you think
they'll side with? This is not to suggest that the United States shut down all of its
intelligence operations. After all, other countries spy, and spying – for better or
worse – is part of international politics. But the United States is one of very
few countries with the capability to monitor absolutely everything that is
going on in the world. This means that the kind of indiscriminate, total
surveillance that the United States is presently engaged in is not strictly
necessary, and unilateral disarmament is an option. No doubt the
intelligence establishment will dismiss the suggestion out of hand. US
intelligence hegemony has its advantages, particularly if you are a US intelligence
officer. Yet as the politics of internet governance shows, it also has significant
costs. By surveilling harmless and innocent foreigners alongside America's enemies, the
United States is alienating the world and projecting an arrogant disregard
for the perfectly ordinary aspirations of billions of people to maintain some
semblance of privacyin their personal lives. Eventually, that alienation could
destroy the free, global Internet that we all love. Is it worth it?
Russia is working with 7 other countries to get more
governmental control over the internet
Shackelford et al 6/25 (Scott J. Shackelford, JD, PhD is an Assistant Professor of
Business Law and Ethics at Indiana University. He is a Senior Fellow at the Indiana
University Center for Applied Cybersecurity Research and the W. Glenn Campbell and
Rita Ricardo-Campbell National Fellow at the Stanford University Hoover Institution.
Enrique Oti is a National Security Affairs Fellow at the Stanford University Hoover
Institution. Jaclyn A. Kerr is a Cybersecurity Postdoctoral Fellow at Stanford
University’s Freeman Spogli Institute. Elaine Korzak, LLM, PhD is a Cybersecurity
Postdoctoral Fellow Stanford University’s Freeman Spogli Institute. Andreas Kuehn is a
Zukerman Cybersecurity Predoctoral Fellow Stanford University’s Freeman Spogli
Institute, Georgetown Journal of International Affairs, “SPOTLIGHT ON CYBER V:
BACK TO THE FUTURE OF INTERNET GOVERNANCE?”, 6/25/15,
http://journal.georgetown.edu/back-to-the-future-of-internet-governance/)//KY
Russia’s positions expressed at PP-14 were relatively consistent with its WCIT-12
strategy. In his five-minute Member State Policy Statement on the opening
day of the conference, the head of the Russian delegation, Nikolay Nikiforov,
Russia’s Minister of Telecom and Mass Communications, praised the ITU’s 150 year
history, but called on it to respond to a changing world, particularly to the
security challenges created by the spread of new information and
communication technologies.[32] He noted that “medals always have two
sides” in thanking the United States for the creation of the Internet, but also
argued that an international convention on Internet governance is needed
to protect against the use of ICTs for cross-border criminal purposes
contrary to the UN Charter, which can endanger individual privacy or
national stability.[33] International norms and rules regulating the
Internet must “be based on international law” and include a “commitment
to non-interference in the internal affairs of states [and to] their equality in
Internet governance, [including] the sovereign right of states to control the
Internet in their national information space.”[34] In essence, Russia has
long argued that the state is the guarantor of its citizens’ rights, and must
also decide the fate of the domestic Internet in a stance similar to China’s
historic position. Russia has emerged in recent years as a proponent of
greater control by states over the Internet within their territories and,
relatedly, supporting a more prominent role for the UN and particularly the
ITU in global Internet governance processes.[35] They have consistently
sought to reduce the influence of private sector organizations such as
ICANN, which is seen as controlled by the United States, and to increase the
role of intergovernmental state-centric processes over and above the multistakeholder status quo. At WCIT-12, Russia led a group of seven countries
(Russia, Saudi Arabia, China, Sudan, Egypt, Algeria, and the UAE) in submitting a
controversial proposal for alterations to the International
Telecommunication Regulations that would have given national
governments more legal authority over the Internet within their
borders.[36] The proposal was widely interpreted by Internet rights
activists as a bid to gain international legal legitimacy for domestic
censorship and other infringements on Internet access or content.[37]
However, this position, after enjoying widespread support at WCIT-12, has now been
largely repudiated at both NETmundial and PP-14.[38]
Surveillance kills Internet freedom
NSA surveillance wrecks US cred in promoting Internet Freedom
and spills over to larger foreign policy cred
Kehl, 14 – Policy Analyst at New America’s Open Technology Institute (Danielle,
“Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom &
Cybersecurity” July, https://www.newamerica.org/oti/surveillance-costs-the-nsasimpact-on-the-economy-internet-freedom-cybersecurity/
Mandatory data localization proposals are just one of a number of ways that foreign
governments have reacted to NSA surveillance in a manner that threatens U.S. foreign
policy interests, particularly with regard to Internet Freedom. There has been a quiet
tension between how the U.S. approaches freedom of expression online in
its foreign policy and its domestic laws ever since Secretary of State Hillary
Clinton effectively launched the Internet Freedom agenda in January 2010.170
But the NSA disclosures shined a bright spotlight on the contradiction: the
U.S. government promotes free expression abroad and aims to prevent
repressive governments from monitoring and censoring their citizens while
simultaneously supporting domestic laws that authorize surveillance and
bulk data collection. As cybersecurity expert and Internet governance scholar Ron
Deibert wrote a few days after the first revelations: “There are unintended consequences
of the NSA scandal that will undermine U.S. foreign policy interests – in particular,
the ‘Internet Freedom’ agenda espoused by the U.S. State Department and its
allies.”171 Deibert accurately predicted that the news would trigger reactions from both
policymakers and ordinary citizens abroad, who would begin to question their
dependence on American technologies and the hidden motivations behind the United
States’ promotion of Internet Freedom. In some countries, the scandal would be
used as an excuse to revive dormant debates about dropping American
companies from official contracts, score political points at the expense of
the United States, and even justify local monitoring and surveillance.
Deibert’s speculation has so far proven quite prescient. As we will describe in this
section, the ongoing revelations have done significant damage to the
credibility of the U.S. Internet Freedom agenda and further jeopardized the
United States’ position in the global Internet governance debates. Moreover,
the repercussions from NSA spying have bled over from the Internet policy
realm to impact broader U.S. foreign policy goals and relationships with
government officials and a range of other important stakeholders abroad.
In an essay entitled, “The End of Hypocrisy: American Foreign Policy in the Age of
Leaks,” international relations scholars Henry Farrell and Martha Finnemore argue that
a critical, lasting impact of information provided by leakers like Edward Snowden is “the
documented confirmation they provide of what the United States is actually doing and
why. When these deeds turn out to clash with the government’s public rhetoric, as they
so often do, it becomes harder for U.S. allies to overlook Washington’s covert behavior
and easier for U.S. adversaries to justify their own.”172 Toward the end of the essay,
Farrell and Finnemore suggest, “The U.S. government, its friends, and its foes can no
longer plausibly deny the dark side of U.S. foreign policy and will have to address it
head-on.” Indeed, the U.S. is currently working to repair damaged bilateral
and multilateral relations with countries from Germany and France to Russia and
Israel,173 and it is likely that the effects of the NSA disclosures will be felt for
years in fields far beyond Internet policy.174
Wrecks overall internet freedom globally
Kehl, 14 – Policy Analyst at New America’s Open Technology Institute (Danielle,
“Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom &
Cybersecurity” July, https://www.newamerica.org/oti/surveillance-costs-the-nsasimpact-on-the-economy-internet-freedom-cybersecurity/
The effects of the NSA disclosures on the Internet Freedom agenda go
beyond the realm of Internet governance. The loss of the United States as a
model on Internet Freedom issues has made it harder for local civil society
groups around the world—including the groups that the State Department’s
Internet Freedom programs typically support203—to advocate for Internet
Freedom within their own governments.204 The Committee to Protect
Journalists, for example, reports that in Pakistan, “where freedom of expression is
largely perceived as a Western notion, the Snowden revelations have had a damaging
effect. The deeply polarized narrative has become starker as the corridors of
power push back on attempts to curb government surveillance.”205 For some
of these groups, in fact, even the appearance of collaboration with or support
from the U.S. government can diminish credibility, making it harder for them to
achieve local goals that align with U.S. foreign policy interests.206 The gap in trust is
particularly significant for individuals and organizations that receive
funding from the U.S. government for free expression activities or
circumvention tools. Technology supported by or exported from the United
States is, in some cases, inherently suspect due to the revelations about the
NSA’s surveillance dragnet and the agency’s attempts to covertly influence product
development.
Moreover, revelations of what the NSA has been doing in the past decade are
eroding the moral high ground that the United States has often relied upon
when putting public pressure on authoritarian countries like China, Russia,
and Iran to change their behavior. In 2014, Reporters Without Borders added the
United States to its “Enemies of the Internet” list for the first time, explicitly linking the
inclusion to NSA surveillance. “The main player in [the United States’] vast surveillance
operation is the highly secretive National Security Agency (NSA) which, in the light of
Snowden’s revelations, has come to symbolize the abuses by the world’s
intelligence agencies,” noted the 2014 report.207 The damaged perception of
the United States208 as a leader on Internet Freedom and its diminished
ability to legitimately criticize other countries for censorship and
surveillance opens the door
for foreign leaders to justify—and even expand—their own efforts.209 For
example, the Egyptian government recently announced plans to monitor social media
for potential terrorist activity, prompting backlash from a number of advocates for free
expression and privacy.210 When a spokesman for the Egyptian Interior Ministry, Abdel
Fatah Uthman, appeared on television to explain the policy, one justification that he
offered in response to privacy concerns was that “the US listens in to phone calls, and
supervises anyone who could threaten its national security.”211 This type of rhetoric
makes it difficult for the U.S. to effectively criticize such a policy. Similarly, India’s
comparatively mild response to allegations of NSA surveillance have been seen by some
critics “as a reflection of India’s own aspirations in the world of surveillance,” a further
indication that U.S. spying may now make it easier for foreign governments to quietly
defend their own behavior.212 It is even more difficult for the United States to credibly
indict Chinese hackers for breaking into U.S. government and commercial targets
without fear of retribution in light of the NSA revelations.213 These challenges
reflect an overall decline in U.S. soft power on free expression issues.
Data localization kills internet
Mandatory data localization wrecks US internet company
competitiveness and US internet freedom – also threatens the
functioning of the internet itself
Kehl, 14 – Policy Analyst at New America’s Open Technology Institute (Danielle,
“Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom &
Cybersecurity” July, https://www.newamerica.org/oti/surveillance-costs-the-nsasimpact-on-the-economy-internet-freedom-cybersecurity/
Some analysts have questioned whether data localization and protection proposals are
politically motivated and if they would actually enhance privacy and security for
ordinary individuals living in foreign countries,160 especially given the existence of
similar laws in a number of countries and Mutual Legal Assistance Treaties (MLATs)
between nations that provide cross-border access to data stored for lawful
investigations.161 Yet there is no doubt that American companies will pay a steep
price if these policies move forward. Mandatory data localization laws
could lead to soaring costs for major Internet companies such as Google,
Facebook, and Twitter, who would be faced with the choice of investing in
additional, duplicative infrastructure and data centers in order to comply
with new regulations or pulling their business out of the market
altogether.162 In testimony before Congress last November, for example, Google’s
Director of Law Enforcement and Information Security suggested that requirements
being discussed in Brazil could be so onerous that they would effectively bar
Google from doing business in the country.163 The penalties that companies face
for violating these new rules are also significant. In some cases, unless U.S. policy
changes, it may be virtually impossible for American companies to avoid
violating either domestic or foreign laws when operating overseas.164 The
costs and legal challenges could easily prevent firms from expanding in the first place or
cause them to leave existing markets because they are no longer profitable.165 ITIF’s
Daniel Castro has suggested that data privacy rules and other restrictions could slow the
growth of the U.S. technology-services industry by as much as four percent.166
Data localization proposals also threaten to undermine the functioning of
the Internet, which was built on protocols that send packets over the fastest
and most efficient route possible, regardless of physical location. If actually
implemented, policies like those suggested by India and Brazil would subvert those
protocols by altering the way Internet traffic is routed in order to exert more national
control over data.167 The localization of Internet traffic may also have significant
ancillary impacts on privacy and human rights by making it easier for countries to
engage in national surveillance, censorship, and persecution of online dissidents,
particularly where countries have a history of violating human rights and ignoring rule
of law.168 “Ironically, data localization policies will likely degrade – rather
than improve – data security for the countries considering them, making
surveillance, protection from which is the ostensible reason for
localization, easier for domestic governments, if not foreign powers, to
achieve,” writes Jonah Force Hill.169 The rise in data localization and data
protection proposals in response to NSA surveillance threatens not only
U.S. economic interests, but also Internet Freedom around the world.
Data localization kills internet freedom
Data localization threatens internet freedom – creates a
bordered internet
Kehl, 14 – Policy Analyst at New America’s Open Technology Institute (Danielle,
“Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom &
Cybersecurity” July, https://www.newamerica.org/oti/surveillance-costs-the-nsasimpact-on-the-economy-internet-freedom-cybersecurity/
The NSA disclosures have prompted some foreign leaders to propose new
policies for data localization and data protection that could have serious
ramifications for the Internet ecosystem. In the name of strengthening
privacy and security, many of these changes could hurt American tech
companies, impact the future growth of the network as a whole, and
endanger human rights and Internet Freedom.99 In particular, proposals that
would require data localization or strengthen data protection laws could
fundamentally alter the way traffic flows over the Internet and create
significant additional compliance costs for American technology companies operating
overseas. Major economic powers such as Germany, Brazil, and India have discussed
requiring that all Internet traffic be routed or stored locally. Various leaders in these
countries have also urged government agencies and their citizens to stop
using American tools altogether because of concerns about backdoors or
other arrangements with the NSA.100 Meanwhile, legislators in the European
Union have passed strict new data protection rules for the continent and considered
various privacy-focused proposals, including the development of “national clouds”
and the suspension of key trade agreements with the United States.101 “The
vast scale of online surveillance revealed by Edward Snowden is leading to the breakup
of the Internet as countries scramble to protect privacy or commercially sensitive emails
and phone records from UK and US security services,” reported The Guardian in
November 2013.102 In combination, these various proposals could threaten the
Internet economy while endangering privacy and free expression.
Mandatory Data Localization and the Costs of a Bordered Internet
Internet jurisdiction and borders were contentious issues long before the Snowden
leaks, but the debate has become significantly more complex in the past year. For
decades, the borderless nature of cyberspace103 has raised concerns about
sovereignty and how governments can regulate and access their citizens’ personal
information or speech when it is stored on servers that may be located all over the
world.104 Various data localization and national routing proposals have
been put forth by governments that seek greater control of the information
that flows within their borders, often in order to make censorship and
surveillance over the local population easier.105 On the other side, free speech
advocates, technologists, and civil society organizations generally advocate for a
borderless cyberspace governed by its own set of internationally-agreed upon rules that
promote the protection of human rights, individual privacy, and free expression.106 The
revelations about NSA surveillance have heightened concerns on both sides of this
debate. But the disclosures appear to have given new ammunition to proponents
of greater governmental control over traffic and network infrastructure,
accelerating the number and scope of national control proposals from both long-time
advocates as well as governments with relatively solid track records on human
rights.107
There are now more than a dozen countries that have introduced or are actively
discussing data localization laws.108 Broadly speaking, data localization can be defined
as any measures that “specifically encumber the transfer of data across national
borders,” through rules that prevent or limit these information flows.109 The data
localization proposals being considered post-Snowden generally require that foreign ICT
companies maintain infrastructure located within a country and store some or all of
their data on that country’s users on local servers.110 Brazil, for example, has proposed
that Internet companies like Facebook and Google must set up local data centers so that
they are bound by Brazilian privacy laws.111 The Indian government’s draft policy would
force companies to maintain part of their IT infrastructure in-country, give local
authorities access to the encrypted data on their servers for criminal investigations, and
prevent local data from being moved out of country.112 Germany, Greece, Brunei, and
Vietnam have also put forth their own data sovereignty proposals. Proponents argue
that these policies would provide greater security and privacy protection because local
servers and infrastructure can give governments both physical control and legal
jurisdiction over the data being stored on them—although the policies may come with
added political and economic benefits for those countries as well. “Home grown and
guaranteed security in data storage, hardware manufacture, cloud computing services
and routing are all part of a new discussion about ‘technological sovereignty,’” write
Mascolo and Scott. “It is both a political response and a marketing opportunity.” 113 At
the same time, data localization can also facilitate local censorship and
surveillance, making it easier for governments to exert control over the
Internet infrastructure.
Data localization kills cybersecurity
Data localization wrecks cybersecurity
Chandler and Le, 15 - * Director, California International Law Center, Professor of
Law and Martin Luther King, Jr. Hall Research Scholar, University of California, Davis;
A.B., Harvard College; J.D., Yale Law School AND **Free Speech and Technology
Fellow, California International Law Center; A.B., Yale College; J.D., University of
California, Davis School of Law (Anupam and Uyen, “DATA NATIONALISM” 64 Emory
L.J. 677, lexis)
Closely related to the goal of avoiding foreign surveillance through data localization is
the goal of protecting the privacy and security of personal information against
nongovernmental criminal activities. As the country studies above show, the laws of
many countries make it difficult to transfer personal data outside of national borders in
the name of privacy and security. While these laws are not explicitly designed to localize
data, by creating significant barriers to the export of data, they operate as data
localization measures.
[*719] The irony is that such efforts are likely to undermine, not strengthen, the
privacy and security of the information. n195 First, localized data servers
reduce the opportunity to distribute information across multiple servers in
different locations. As we have noted above, the information gathered together
in one place offers a tempting jackpot, an ideal target for criminals. As some
computer experts have noted, "Requirements to localize data ... only make it impossible
for cloud service providers to take advantage of the Internet's distributed infrastructure
and use sharding and obfuscation on a global scale." n196 Sharding is the process in
which rows of a database table are held separately in servers across the world - making
each partition a "shard" that provides enough data for operation but not enough to reidentify an individual. n197 "The correct solution," Pranesh Prakash, Policy Director
with India's Centre for Internet and Society suggests, "would be to encourage the
creation and use of de-centralised and end-to-end encrypted services that do not store
all your data in one place." n198
Second, as we noted above, the Protected Local Provider offering storage and
processing services may be more likely to have weak security infrastructure
than companies that continuously improve their security to respond to the
ever-growing sophistication of cyberthieves. As a recent cover feature of the
IEEE Computer Society magazine observes, "The most common threats to data in
the cloud involve breaches by hackers against inadequately protected
systems, user carelessness or lack of caution, and engineering errors." n199
Information technology associations from Europe, Japan, and the United States have
echoed this observation, arguing that "security is a function of how a product is made,
used, and maintained, not by whom or where it is made." n200 When Australia was
contemplating a rule requiring health data to [*720] remain in the country (a rule that
was subsequently implemented), Microsoft made a similar argument. Microsoft argued
that the rule might undermine the security of Australian health information by limiting
consumer choice among potential providers and wrote, "Consumers should have the
ability to personally control their [personal electronic health records] by choosing to
have their [personal electronic health records] held by an entity not located within
Australia's territorial boundaries if they believe that entity can provide to them a service
that meets their individual needs." n201
Indeed, countries pushing for data localization themselves are sometimes
hotbeds of cybercrimes. According to experts, "Cyber security is notoriously weak in
Indonesia." n202 Indeed, the nation has been called a "hacker's paradise." n203 One
2013 report on Vietnam suggests that "2,045 agency and business websites were hacked
this year, but the number of cyber security experts was too small to cope with all of
them." n204 Another account suggests that "Brazil is among the main targets of virtual
threats such as malware and phishing." n205 For example, in 2011, hackers stole one
billion dollars from companies in Brazil, as Forbes put it, the "worst prepared nation to
adopt cloud technology." n206 At times, a cybertheft can begin with a domestic
burglary, as in the case of one recent European episode. n207 Or cyberthefts can [*721]
be accomplished with a USB "thumb" drive. In January 2014, information about more
than 100 million South Korean credit cards was stolen, likely through an "inside job" by
a contractor armed with a USB drive. n208
Most fundamentally, there is little reason to believe that the personal information of
British Columbians is more secure just because it is stored on a government computer in
Vancouver than one owned by IBM, a few miles further south.
AT: Data localization solves surveillance
Data localization increases the risk of surveillance
Chandler and Le, 15 - * Director, California International Law Center, Professor of
Law and Martin Luther King, Jr. Hall Research Scholar, University of California, Davis;
A.B., Harvard College; J.D., Yale Law School AND **Free Speech and Technology
Fellow, California International Law Center; A.B., Yale College; J.D., University of
California, Davis School of Law (Anupam and Uyen, “DATA NATIONALISM” 64 Emory
L.J. 677, lexis)
Fourth, far from making surveillance more difficult for a foreign
government, localization requirements might in fact make it easier. By
compelling companies to use local services rather than global ones, there is a
greater likelihood of choosing companies with weak security measures. By
[*717] their very nature, the global services are subject to intense worldwide
competition, while local services - protected by the data localization
requirements - might have less need to offer stronger security to attract
customers, and fewer resources to do so, than companies with a global
scale. Weaker security makes such systems easier targets for foreign
surveillance. This is what we call the "Protected Local Provider" problem.
Fifth, data localization might actually facilitate foreign surveillance.
Centralizing information about users in a locality might actually ease the
logistical burdens of foreign intelligence agencies, which can now concentrate
their surveillance of a particular nation's citizens more easily. We call this the "Jackpot"
problem.
AT: Data localization helps law enforcement
Data localization doesn’t aid law enforcement
Chandler and Le, 15 - * Director, California International Law Center, Professor of
Law and Martin Luther King, Jr. Hall Research Scholar, University of California, Davis;
A.B., Harvard College; J.D., Yale Law School AND **Free Speech and Technology
Fellow, California International Law Center; A.B., Yale College; J.D., University of
California, Davis School of Law (Anupam and Uyen, “DATA NATIONALISM” 64 Emory
L.J. 677, lexis)
Equally important, it seems unlikely that data localization will prove an
effective means to ensure that data about their residents is available to law
enforcement personnel when they want it. Moreover, other alternatives are
reasonably available to assist law enforcement access to data - alternatives that are both
less trade restrictive and more speech-friendly than data localization.
Data localization will not necessarily provide law enforcement better access
to a criminal's data trail because localization requirements are extremely
hard to enforce. They might simply end up driving potential wrongdoers
abroad to less compliant and more secretive services. Indeed, the most lawabiding companies will follow costly data localization rules, while others
will simply ignore them, comforted by the knowledge that such laws are difficult to
enforce. Any success with gaining information from these companies will
likely prove temporary, as, over time, potential scofflaws will become aware
of the monitoring and turn to services that intentionally skirt the law. The
services avoiding the law will likely be foreign ones, lacking any [*733]
personnel or assets on the ground against which to enforce any sanction.
Thus, understood dynamically, the data localization requirement will only
hamper local and law-abiding enterprises, while driving some citizens
abroad.
Law enforcement is, without doubt, a laudable goal, so long as the laws themselves do
not violate universal human rights. Many governments already have authority under
their domestic laws to compel a company operating in their jurisdictions to share data of
their nationals held by that company abroad. A recent study of ten countries concluded
that the government already had the right to access data held extraterritorially in the
cloud in every jurisdiction examined. n268 Although the process varied, "every single
country ... vests authority in the government to require a Cloud service provider to
disclose customer data in certain situations, and in most instances this authority enables
the government to access data physically stored outside the country's borders." n269
Even if companies refuse to comply with such orders, or if the local subsidiary lacks the
authority to compel its foreign counterpart to share personal data, governments can
resort to information-sharing agreements. For example, the Convention on Cybercrime,
which has been ratified by forty-four countries including the United States, France, and
Germany, n270 obliges Member States to adopt and enforce laws against cybercrimes
and to provide "mutual assistance" to each other in enforcing cyberoffenses. n271 Many
states have entered into specific Mutual Legal Assistance Treaties (MLATs) with foreign
nations. These treaties establish a process that protects the rights of [*734] individuals
yet gives governments access to data held in foreign jurisdictions. Currently, the United
States has MLATs in force with fifty-six countries. n272 The United States also entered
into a Mutual Legal Assistance Agreement (MLAA) with China and Taiwan. n273 All the
countries discussed in the country studies above, with the exception of Indonesia,
Kazakhstan, and Vietnam, have MLAT arrangements in force with the United States.
Generally, MLATs "specify which types of requested assistance must be provided, and
which may be refused." n274 Requests for assistance may be refused typically when the
execution of such request would be prejudicial to the state's security or public interest;
the request relates to a political offense; there is an absence of reasonable grounds; the
request does not conform to the MLAT's provisions; or the request is incompatible with
the requested state's law. n275 The explanatory notes to the MLAT between the United
States and the European Union observe that a request for data shall only be denied on
data protection grounds in "exceptional cases." n276 At the same time, there are
procedural requirements to help ensure that the information gathering is supporting a
proper governmental investigation. For example, Article 17 of the U.S.-Germany MLAT
provides that the government requesting assistance must do [*735] so in writing and
must specify the evidence or information sought, authorities involved, applicable
criminal law provisions, etc. n277
An effective MLAT process gives governments the ability to gather information held on
servers across the world. The International Chamber of Commerce has recognized the
crucial role of MLATs in facilitating the lawful interception of cross-border data flow
and stressed the need to focus on MLATs instead of localization measures. n278
Similarly, the European Commission has recently stressed that the rebuilding of trust in
the U.S.-E.U. relationship must focus in part on a commitment to use legal frameworks
such as the MLATs. n279 Mutual cooperation arrangements are far more likely
to prove effective in the long run to support government information
gathering efforts than efforts to confine information within national
borders.
AT: PPD 28 solves
Obama PPD doesn’t solve section 702 perception problems – it’s
not applied to it
Nojeim, 14 - Director, Project on Freedom, Security & Technology at the Center for
Democracy & Technology (Greg, “COMMENTS TO THE PRIVACY AND CIVIL
LIBERTIES OVERSIGHT BOARD REGARDING REFORMS TO SURVEILLANCE
CONDUCTED PURSUANT TO SECTION 702 OF FISA” 4/11)
The Presidential Policy Directive that President Obama issued on January 17, 2014
(PPD-28),7 while remarkable in many ways, does not sufficiently address this
problem. It prohibits the government from collecting signals intelligence
for the purpose of suppressing or burdening criticism or dissent, but that
prohibition permits the continued collection of information about such
expressive activities merely because they are relevant to U.S. foreign affairs.
On the other hand, PPD-28 does include very important restrictions on the use of
information collected in bulk for foreign intelligence purposes. They seem carefully
thought out, and each permitted use of information collected in bulk would directly
advance U.S. national security interests. These are among the most significant
provisions of PPD-28, but they do not apply to Section 702 because it is not
considered a bulk collection program.8
AT: USA Freedom Act solves
The Freedom Act doesn’t change section 702
Froomkin, 6/2/15 - Dan Froomkin is a reporter, columnist, and editor with a focus on
coverage of U.S. politics and media. During a nearly three-decade long career in
journalism, which started in local news, he has served as the senior Washington
correspondent and bureau chief for The Huffington Post, as editor of
WashingtonPost.com, and as deputy editor of NiemanWatchdog.org (Dan, “USA
FREEDOM ACT: SMALL STEP FOR POST-SNOWDEN REFORM, GIANT LEAP FOR
CONGRESS” The Intercept, https://firstlook.org/theintercept/2015/06/02/one-smallstep-toward-post-snowden-surveillance-reform-one-giant-step-congress/
And while the Freedom Act contains a few other modest reform provisions‚
such as more disclosure and a public advocate for the secretive Foreign Intelligence
Surveillance Court, it does absolutely nothing to restrain the vast majority of
the intrusive surveillance revealed by Snowden.
It leaves untouched formerly secret programs the NSA says are authorized
under section 702 of the FISA Amendments Act, and that while ostensibly
targeted at foreigners nonetheless collect vast amounts of American communications. It
won’t in any way limit the agency’s mass surveillance of non-American communications.
Solvency
O/V
Extend the Eoyang and Bishai 15 card- Restricting surveillence to
section 702 is K2 getting trust back from customers, tech
companies, and the international community. BUT
Applying PPD 28 to these restrictions is vital to ensuring that
NSA overreach doesn’t happen again, and eliminates any
negative connotaitions of PRISM, that’s our Nojeim 14 card
Extend the Kehl 14 evidence- The transparency garnered off the
plan is K2 restoring US credibility which allows the US to
prevent global data localization.
Global modeling
The plan restores US cred as a global leader on privacy by
limiting the FAA
Edgar, 4/13/15 - visiting fellow at the Institute and adjunct professor of law at the
Georgetown University Law Center (Timothy, “The Good News About Spying”
https://www.foreignaffairs.com/articles/united-states/2015-04-13/good-news-aboutspying
NEXT STEPS
Has surveillance reform gone far enough? Hardly. Obama has taken the first steps,
but the government should take six more to enhance public confidence in
surveillance programs.
First, the intelligence community should do even more to increase transparency. IC on
the Record is a good start, but it is mostly reactive, providing context to programs that
Snowden had already leaked. The intelligence community should continue to release as
much as it possibly can about surveillance programs without compromising sources and
methods—even if they have not been leaked. Given Snowden’s widespread public
acclaim, coming clean about such controversial intelligence programs is not just good
government, but also provides the surest way to preserve vital intelligence capabilities.
With greater transparency, intelligence agencies can stay one step ahead of
future leakers and earn back the trust of a skeptical public.
The United States should also pivot from its defensive position and take the
lead on global privacy. The United States has an impressive array of privacy
safeguards, and it has even imposed new ones that protect citizens of every country.
Despite their weaknesses, these safeguards are still the strongest in the world. The U.S.
government should not be shy about trumpeting them, and should urge other countries
to follow its lead. It could begin by engaging with close allies, like the United Kingdom,
Germany, and other European countries, urging them to increase transparency and
judicial supervision of their own communications surveillance activities.
The government also needs to finish the job on telephone records. The law that allows
for bulk collection of telephone records is set to expire on June 1, 2015. Congress
should act now to pass sensible reforms that would replace bulk collection
with a privacy-preserving alternative. The only truly viable option remains the bill
that died in November last year.
Washington also needs to work with U.S. technology companies to reform
PRISM and other surveillance programs that have been an embarrassment
for U.S. companies. Congress should narrow the FISA Amendments Act of
2008 that authorizes PRISM. That law allows the government to obtain
secret court orders targeting communications that include foreign
participants of interest to the NSA with the compelled assistance of U.S.
companies. Congress could start by limiting such orders to the same six
specific serious security threats that are included in Obama’s policy
directive for bulk signals intelligence collection.
AT: Companies suffer reputational costs
FAA exclusivity on balance protects companies from
reputational consequences
Eoyang and Bishai, 15 - *Mieke Eoyang is the Director of the National Security
Program at Third Way, a center-left think tank. She previously served as Defense Policy
Advisor to Senator Edward M. Kennedy, and a subcommittee staff director on the House
Permanent Select Committee on Intelligence, as well as as Chief of Staff to Rep. Anna
Eshoo (D-Palo Alto); **Chrissy Bishai is a Fellow at Third Way (“Restoring Trust
between U.S. Companies and Their Government on Surveillance Issues” 3/19,
http://www.thirdway.org/report/restoring-trust-between-us-companies-and-theirgovernment-on-surveillance-issues
Others have argued that the FAA shifts the burden of cooperation solely
onto the company, which will suffer greater reputational harm as a more
witting participant in affirmatively granting the government’s requests. However,
companies have suffered reputational harm as a result of allegations of
unwitting cooperation. Making the cooperation known, even if it’s secret,
gives the companies the opportunity to account for it in their own planning.
AT: Foreign servers
Plan reverses incentives for companies to shift to foreign
subsidiaries
Eoyang and Bishai, 15 - *Mieke Eoyang is the Director of the National Security
Program at Third Way, a center-left think tank. She previously served as Defense Policy
Advisor to Senator Edward M. Kennedy, and a subcommittee staff director on the House
Permanent Select Committee on Intelligence, as well as as Chief of Staff to Rep. Anna
Eshoo (D-Palo Alto); **Chrissy Bishai is a Fellow at Third Way (“Restoring Trust
between U.S. Companies and Their Government on Surveillance Issues” 3/19,
http://www.thirdway.org/report/restoring-trust-between-us-companies-and-theirgovernment-on-surveillance-issues
The move by certain U.S. companies to place subsidiaries in foreign
ownership to resist requests by the U.S. government presents an interesting
twist on this idea. In shifting the balance back to increased protections for
U.S. companies, this legislation would change the incentives so that
claiming U.S. law would have operational advantages in giving companies
uniformity of law for all their data. This would also encourage the use of a
single choice of law for all data governed by a company—that of the nationality
of incorporation—rather than encouraging a choice of law patchwork to
govern the data as it flows around the world.
AT: Exclude PPD-28
Section 702 is overbroad – can’t solve reputational costs without
curtailing surveilance
Nojeim, 14 - Director, Project on Freedom, Security & Technology at the Center for
Democracy & Technology (Greg, “COMMENTS TO THE PRIVACY AND CIVIL
LIBERTIES OVERSIGHT BOARD REGARDING REFORMS TO SURVEILLANCE
CONDUCTED PURSUANT TO SECTION 702 OF FISA” 4/11)
Section 702 permits the government to compel communications service
providers to assist with intelligence surveillance that targets non-U.S.
persons (persons other than U.S. citizens and lawful permanent residents) reasonably
believed to be abroad. Though it is defended as a necessary counterterrorism and
national security power, Section 702 broadly authorizes collection, retention,
and use of communications content unnecessary for national security and unrelated
to counterterrorism. The overbroad use of Section 702 infringes upon the privacy
rights of both U.S. persons, and of non-U.S. persons abroad, has already caused
some damage to the American tech industry globally, and could cause much
more.3
Section 702 monitors any foreign target regardless of national
security interest – creates an enormous perception of abuse
Nojeim, 14 - Director, Project on Freedom, Security & Technology at the Center for
Democracy & Technology (Greg, “COMMENTS TO THE PRIVACY AND CIVIL
LIBERTIES OVERSIGHT BOARD REGARDING REFORMS TO SURVEILLANCE
CONDUCTED PURSUANT TO SECTION 702 OF FISA” 4/11)
The FISA provisions that govern intelligence surveillance of targets in the U.S. permit
the government to engage in electronic surveillance to collect “foreign intelligence
information.” For purposes of surveillance that targets a non-U.S. person, it is defined
broadly as: (1) information that relates to the ability of the U.S. to protect against a
hostile attack, espionage, sabotage or international terrorism or proliferation of
weapons of mass destruction; or (2) information with respect to a foreign territory or
foreign power (a foreign government, political party, or entity controlled by a foreign
government, or a foreign terrorist organization) that relates to the security of the U.S. or
to the conduct of U.S. foreign affairs.4 When the government applies to the Foreign
Intelligence Surveillance Court (FISC) for permission to conduct surveillance of targets
in the U.S., it must certify that a significant purpose of the surveillance it will conduct is
to collect foreign intelligence information.5
Because “foreign intelligence information” is defined so broadly, and because the FISC
never actually rules on whether the significant purpose test is met, the purpose
limitation that governs FISA surveillance of targets in the U.S. is easily met. FISA
surveillance in the U.S. is instead effectively constrained by an additional
requirement: the requirement that the government prove to the FISC that
there is probable cause to believe the target of surveillance is a terrorist,
spy, or other agent of a foreign power. Thus, Congress effectively constrained
FISA surveillance of targets in the U.S. by permitting that surveillance to target only a
narrow class of persons and entities.
For surveillance of people reasonably believed to be outside the U.S., Section 702
adopts the broad purpose requirement, but couples it with a broad class of
surveillance targets. Section 702 is not constrained by the requirement that
the target be an agent of a foreign power. Instead, the target need only be a
non-U.S. person reasonably believed to be abroad. Effectively, Congress
borrowed the broad purpose for FISA intelligence surveillance (collect “foreign
intelligence information”) and applied it to surveillance abroad without limiting the
class of potential targets to “agents of a foreign power.”
This has prompted concern globally that surveillance under Section 702 is
broadly directed at individuals not suspected of wrongdoing, and could
include targeting based at least in part on political activities. A peaceful protest at a U.S.
base in Germany or a demonstration against rising food prices in India “relate to” U.S.
foreign policy; non-U.S. persons involved in those protests could be monitored under
Section 702. A 2012 cloud computing report to the European Parliament included a
finding that under Section 702, it is lawful in the U.S. to conduct purely political
surveillance on non-U.S. persons’ data stored by U.S. cloud companies.6
Such actions raise serious human rights concerns. Further, fear of the mere
possibly that this overbroad surveillance is occurring has significantly
damaged the U.S. tech industry abroad.
Off-Case Answers
Topicality
Domestic - Territories
C/IA US person is a citizen, corporation, or lawful permanent
resident
Jordan, 6 - LL.M., New York University School of Law (2006); cum laude, Washington
and
Lee University School of Law (2003) (David, “Decrypting the Fourth Amendment:
Warrantless NSA Surveillance and the Enhanced Expectation of Privacy Provided by
Encrypted Voice Over Protocol” 47 B.C.L. Rev. 505 (2006),
http://lawdigitalcommons.bc.edu/bclr/vol47/iss3/2
8 FISA's provisions require the government to obtain a FISA warrant when seeking to
surveil a "United States person." A U.S. person is defined as a U.S. citizen, a
permanent resident, a corporation incorporated in the United States, or an
unincorporated association consisting of mostly U.S. citizens or permanent
residents. FISA, 50 U.S.C. § 1801(1) (2000).
The N.S.A. defines domestic surveillance as associated with
United States persons
Cassidy 13
(John, a 20 year staff writer at the New Yorker, N.S.A. Latest: The Secret History of
Domestic Surveillance, http://www.newyorker.com/news/john-cassidy/n-s-a-latestthe-secret-history-of-domestic-surveillance )//NC
On a day when President Obama said “I’m not going to be scrambling any jets to get a twenty-nine-year-old hacker”—thank
goodness for that—theGuardian’s Glenn Greenwald and Spencer Ackerman have published another set of N.S.A.
documents that detail how the Agency’s domestic-surveillance programs
have evolved over the past decade or so. The documents presumably came from Edward Snowden,
although the Guardian reports don’t say so explicitly. The headline news is that, for two years of the Obama Administration—from
2009 to 2011—the N.S.A. continued a previously undisclosed Bush-era program that enabled the Agency to sweep up vast amounts
of information about American citizens’ Internet use. This included whom they were e-mailing with and which computers they were
using. The program, which went under the code name “Stellar Wind,” was ended in 2011, and hasn’t been restarted, a senior
Administration official told the newspaper. For those of us who are concerned about this stuff, it’s depressing to think that the
Administration, in addition to allowing the N.S.A. to collect vast amounts of metadata about Americans’ personal phone calls, also
preserved a program to track U.S. citizens’ Internet usage. (In the case of an e-mail, metadata includes the names of the sender and
all of the recipients, plus the I.S.P. address of the device used to access the Internet. The subject line and what the e-mail says are
considered “content,” and under operation Stellar Wind, at least, they weren’t collected.) On the other hand, the online metadatacollection program was ended in 2011, although exactly why that happened isn’t clear. Shawn Turner, the Obama Administration’s
director of communications for national intelligence, told the Guardian that operation Stellar Wind was stopped for “operational and
resource reasons,” but he didn’t specify what these were. In a separate story, Greenwald and Ackerman reported that the new
documents confirm that the N.S.A., in targeting suspects overseas and those they communicate with, still mines vast amounts of
online data from American citizens. Thanks to the previous revelations about Operation Prism, we sort of knew this. But the new
documents add some telling details about the scale of the online snooping. For example, by the end of last year, one particular N.S.A.
Internet tracking program called ShellTrumpet (there appear to have been many others) had already processed a trillion
(1,000,000,000,000) metadata records. If you, like me, are wondering how things came to this, the documents, which include a topsecret draft of a 2009 historical review by the N.S.A.’s Inspector General, provide some of the answers. Indeed, that may well be
their most lasting contribution. As you might have guessed, it all goes back to the immediate aftermath of the 9/11 attacks, when
George W. Bush issued an internal order with this title: AUTHORIZATION FOR SPECIFIED ELECTRONIC SURVEILLANCE
ACTIVITIES DURING A LIMITED PERIOD TO DETECT AND PREVENT ACTS OF TERRORISM WITHIN THE UNITED STATES
According to the Inspector General’s report, the order was drafted by David Addington, the chief counsel to Vice-President Dick
Cheney. General Michael Hayden, who was the director of the N.S.A. from 1999 until 2005, “suggested that the ability to collect
information with one end in the United States without a court order would increase NSA’s speed and agility,” the report says.
“General Hayden stated that after two additional meetings with the Vice President, the Vice President asked him to work with his
counsel, David Addington.” In retrospect, what’s most notable about the order President Bush signed are the restrictions it
contained. Originally, it lasted for just thirty days, and was limited to online communications in which at least one of the
communicants was located outside the United States. Moreover, it was explicitly based on “the President’s determination that after
the 11 September 2001 terrorist attacks in the United States, an extraordinary emergency existed for national defense purposes.”
Over time, though, the “extraordinary emergency” was deemed a permanent state of affairs, and the scope of the authorization was
broadened until, eventually, it came to include even the collection of data from communications between American citizens located
inside the United States. For a few years, the online surveillance didn’t have any court approval. “NSA determined that FISA
authorization did not allow sufficient flexibility to counter the terrorist threat,” the Inspector General’s report said. In March, 2004,
senior officials at the Justice Department, including James Comey, who was then the acting Attorney General, and who has recently
been nominated to head the F.B.I., objected to this system, prompting the White House and the N.S.A. to bring Stellar Wind to a
halt. But things didn’t end there. As the documents show, and as a must-read pieceby Spencer Ackerman explains, the N.S.A. and the
White House quickly found a way to bring the online-surveillance operations under the ambit of regular intelligence laws, and barely
three months later, in July, 2004, the chief judge in the FISA courts, Colleen Kollar-Kotelly, granted the N.S.A. authority to once
again begin collecting online metadata. “Although NSA lost access to the bulk metadata from 26 March 2004 until the order was
signed, the order essentially gave NSA the same authority to collect bulk internet metadata that it had,” the Inspector General’s
report says, “except that it specified the datalinks from which NSA could collect, and it limited the number of people that could
access the data.” Still, the N.S.A. chafed at the remaining legal restrictions on accessing data from American citizens communicating
online with other American citizens. In a November,
2007, memorandum, which the Guardian has also posted online,
a lawyer at the Justice Department, Kenneth Wainstein, told Michael Mukasey, the New York judge who
had recently taken over as Attorney General, that the N.S.A. wanted a new set of procedures that would give the Agency considerably
broader authorization. The memo said: The Supplemental Procedures, attached at Tab A, would clarify
that the
National Security Agency (NSA) may analyze communications metadata
associated with United States persons and persons believed to be in the United
States…We conclude that the proposed Supplemental Procedures are consistent with the applicable law and we recommend that
you approve them. The memo argued that the new set of procedures, because they covered online metadata rather than actual
content, didn’t violate the Fourth Amendment’s right to privacy, and neither did they need the approval of the FISA courts: “To fall
within FISA’s definition of ‘electronic surveillance,’ an action must satisfy one of the four definitions of that term. None of these
definitions cover the communications metadata analysis at issue here.” Evidently, Mukasey approved the new procedures, and they
formed the legal basis of operation Stellar Wind, which continued until 2011. But it also seems that the FISA courts did, eventually,
approve the program. According to theGuardian’s account, a FISA judge issued a legal order every ninety days approving the
collection, in bulk, of online metadata. Why the court did this, and whether it registered any objections to or demanded any changes
in the N.S.A.’s actions, we don’t know. The FISA court’s deliberations, unlike a lot of other things, remain shrouded in secrecy.
Prefer our interp – Just because these U.S. companies do
business outside of U.S. territories does not mean that they are
not U.S. companies, these companies are still based within the
U.S. which means that we are domestic surveillance within
territory
Standards
Limits: The opposing teams definition overlimits. overlimiting
guts true education on the topic. In order to learn about federal
government domestic surveillance we must address the biggest
form of domestic surveillance which comes from the PRISM
program and the current law governing domestic surveillance.
All forms of govt surveillance has foreign and domestic parts of
their surveillance within it. If we are truly going to learn about
domestic surveillance, if we want the judges, the crowd, the
debaters, and the debate community to truly advance their
knowledge on the topic we must allow PRISM to be part of the
topic. To declare it untopical means you prevent us from truly
understanding the ins and outs of the topic
PRISM is the biggest issue within domestic surveillance
CFR 13 (Council on Foreign Relations, an independent, nonpartisan membership
organization, think tank, and publisher, U.S. Domestic Surveillance,
http://www.cfr.org/intelligence/us-domestic-surveillance/p9763 )//NC
In the wake of the September 11 attacks, Congress passed sweeping legislation to bolster U.S. counterterrorism efforts. Some of the
most controversial measures, including the 2001 USA PATRIOT Act, significantly enhanced the federal government's ability to
collect and analyze private information related to U.S. citizens. Proponents argue that the broader surveillance authorities are
required to uncover and neutralize terrorism plots, while critics say the expanded powers infringe on civil liberties. In 2005, the
Bush administration came under fire from Democrats and activist groups after press reports disclosed the National Security
Agency's warrantless wiretapping program. In 2013, the Obama administration similarly attracted criticism from watchdog groups
upon leaks related to its far-reaching domestic surveillance activities under the NSA. The episode has revived debate over privacy
and national security and raised calls for reform. What
is the domestic surveillance controversy
under Obama? Two NSA surveillance programs were exposed in press
reports in June 2013. First, a Guardian report disclosed a classified Foreign Intelligence Surveillance
Court (FISC) order instructing Verizon, one of the largest U.S. telecommunications firms, to hand
over phone records of millions of Americans to the NSA. Another secret
program, code-named PRISM, accessed troves of communication data—audio/video chats,
emails, photos, and other media—from several U.S. technology companies, according to the
Washington Post. Subsequent leaks revealed details on additional programs that gave the NSA extensive electronic surveillance
tools, both domestic and international, allowing the government to track and tap into conversations of suspected terrorists, civilians,
and even friendly foreign heads of state. Amid criticism from civil rights groups, the Obama administration initially defended the
surveillance program, saying it is legal, limited, and effective in preventing terrorist attacks. Director of National Intelligence James
Clapper said the program does not monitor phone calls, but acquires telephony metadata to be queried only when there is a
"reasonable suspicion" of links to a foreign terrorist organization. Experts say the White House is likely relying on Section 215 of the
Patriot Act, a provision that says government can mandate the turnover of "any tangible things" from any entity as long as the items
are for an investigation to defend against international terrorism or spying. In congressional testimony, NSA chief Gen. Keith
Alexander credited his agency's surveillance with helping prevent "dozens" of terrorist attacks, and said he welcomed a debate on the
legality of the programs. In August, President Obama created a task force of intelligence and legal experts to review NSA operations
and recommend potential reforms. The inquiry is reportedly part of a comprehensive White House review of signals intelligence.
What was the domestic surveillance controversy under Bush? After 9/11, the Bush administration opted not to seek approval from
the FISC before intercepting "international communications into and out of the United States of persons linked to al-Qaeda (PDF) or
related terrorist organizations." The special secret court, set up in 1978 following previous administrations' domestic spying abuses,
was designed to act as a neutral overseer in granting government agencies surveillance authorization. After the NSA program was
revealed by the New York Times in late 2005, former attorney general Alberto R. Gonzales argued (PDF) that President Bush had
the legal authority under the constitution and congressional statute to conduct warrantless surveillance on U.S. persons "reasonably
believed to be linked to al-Qaeda." The 2001 Authorization for Use of Military Force (AUMF), without specifically mentioning
wiretapping, grants the president broad authority to use all necessary force "against those nations, organizations, or persons he
determines planned, authorized, committed, or aided the [9/11] terrorist attacks." This includes, administration officials say, the
powers to secretly gather domestic intelligence on al-Qaeda and associated groups. The Bush administration maintained that the
Foreign Intelligence Surveillance Act (FISA) was an outdated law-enforcement mechanism that was too time-consuming given the
highly fluid, modern threat environment. Administration officials portrayed the NSA program as an "early warning system" (PDF)
with "a military nature that requires speed and agility." Moreover, the White House stressed that the program was one not of
domestic surveillance but of monitoring terrorists abroad, and publicly referred to the operation as the "Terrorist Surveillance
Program." Opponents of the program referred to it as "domestic spying." Under congressional pressure, Gonzales announced in
January 2007 plans to disband the warrantless surveillance program and cede oversight to FISC, but questions about the legality of
the program lingered in Congress and Gonzales resigned months later. But Washington's vow to seek FISA approval for domestic
surveillance was short-lived. In July 2007--weeks before Gonzales stepped down--intelligence officials pressed lawmakers for
emergency legislation to broaden their wiretapping authority following a ruling by the court overseeing FISA that impacted the
government's ability to intercept foreign communications passing through telecommunications "switches" on U.S. soil. In August,
President Bush signed the Protect America Act of 2007, which gave the attorney general and the director of national intelligence
temporary power to approve international surveillance, rather than the special intelligence court. It also said warrants are
unnecessary for surveillance of a person "reasonably believed" to be located overseas. This six-month stopgap measure expired in
early 2008, but the FISA Amendment Act passed just months later contained similar provisions. President Obama reauthorized this
legislation for five more years in December 2012. Why did this become an issue in mid-2013? Edward Snowden, the ex-CIA and
former NSA contractor who leaked news of the two NSA programs, cited concerns over civil liberties violations as his primary
motive. "The NSA has built an infrastructure that allows it to intercept almost everything. With this capability, the vast majority of
human communications are automatically ingested without targeting. If I wanted to see your emails or your wife's phone, all I have
to do is use intercepts. I can get your emails, passwords, phone records, credit cards," he said in an interview with the Guardian.
However, DNI Director Clapper publicly denied initial media reports (PDF) that the PRISM surveillance program was "an
undisclosed collection or data mining program" that unilaterally taps into servers of U.S. telecoms. Rather, he stated the NSA
program was limited and had been "widely known and publicly discussed since its inception in 2008." Specifically, Clapper said the
program operated under Section 702 of FISA that permits the targeting of non-U.S. persons abroad without individualized court
orders. As noted above, President Obama has reauthorized this legislation until 2017. Many U.S. lawmakers have pressed for
Snowden's prosecution, and the Obama administration referred his case to the Justice Department. Snowden fled to Hong Kong in
May and was granted temporary asylum in Russia in August after spending weeks at the Moscow airport. What are the challenges to
domestic surveillance policy? Both Democratic and Republican lawmakers have called for a reexamination of the government's
broad surveillance powers in the wake of disclosures regarding NSA activities. Top-ranking Senators Dianne Feinstein (D-CA) and
John McCain (R-AZ) supported requests for congressional hearings on NSA surveillance, despite their support for the controversial
programs. Sen. Ron Wyden (D-OR), an outspoken critic of NSA's broad authorities, has called on the White House to detail the
extent to which Americans were monitored. In the past, the NSA said it lacked the technical ability to quantify this data. Critics
allege that even if the programs are operating within the letter of law, as the Obama administration says, they violate the law's intent
and the values of democratic society. Some civil liberties activists have appealed for a thorough review of several provisions in the
Patriot Act and FISA Amendments Act that provide controversial surveillance authorities. Civil libertarians question whether
government surveillance programs violate the Fourth Amendment to the U.S. Constitution, which states: "The right of the people to
be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no
Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be
searched, and the persons or things to be seized." In December, Judge Richard J. Leon of the Federal District Court for the District
of Columbia ruled that the NSA's bulk gathering of U.S. telephone metadata likely violates the Constitution. "Surely, such a program
infringes on 'that degree of privacy' that the founders enshrined in the Fourth Amendment," he wrote. The judge ordered the
government to stop collecting data on calls of the two plaintiffs in the case, but stayed the injunction to allow the government a
chance to appeal. Other legal challenges are in early phases, including suits by the American Civil Liberties Union and the Electronic
Frontier Foundation. The Obama administration's task force also released its findings in December, recommending dozens of
changes to current surveillance practice. Significant proposed reforms include: ending the government's indiscrimate collection of
U.S. telephone metadata and requiring authorities to obtain a court order to query this information, held in the private sector;
placing new limits on the monitoring of foreign leaders and ordinary non-Americans; and supporting new encryption standards and
technologies. But legal analysts say that while the recommendations, if implemented, would require greater executive, congressional,
and judicial review of surveillance activities, they would end few programs. Meanwhile, in Congress, two bills that would forbid the
NSA from collecting phone data on Americans not suspected of a crime are still in the early legislative process. The USA Freedom
Act, which would reform the Patriot Act to address privacy concerns, has enough support to pass, but lawmakers are uncertain when
it will be ready for a vote. Still, many Democrats and Republicans say the NSA programs are essential counterterrorism tools that
have proved effective in preventing potential attacks.
Ground: You can still garner all your DA’s or CP, because we are
still within U.S. territories, does not prevent neg from running
any arguments
Other args
AT: Franceschi-Bicchierai - They only mention one company, the
Prism program also goes through the data of US companies
based in the US
AT: Wilson - Yes foreign data goes through US servers and
PRISM surfs through this evidence as well as domestic data,
PRISM doesn’t know the difference when the data first comes in
what we do is make sure that the NSA can’t take info from US
companies regarding domestic persons
Domestic – U.S. Persons
We Meet: We are specifically restricting domestic surveillance of
U.S. corporations, which means that we are using it for coercive
purposes and then we are surveilling U.S. citizens, because
companies are citizens
C/I: A US person is a citizen, corporation, or lawful permanent
resident
Jordan, 6 - LL.M., New York University School of Law (2006); cum laude, Washington
and
Lee University School of Law (2003) (David, “Decrypting the Fourth Amendment:
Warrantless NSA Surveillance and the Enhanced Expectation of Privacy Provided by
Encrypted Voice Over Protocol” 47 B.C.L. Rev. 505 (2006),
http://lawdigitalcommons.bc.edu/bclr/vol47/iss3/2
8 FISA's provisions require the government to obtain a FISA warrant when seeking to
surveil a "United States person." A U.S. person is defined as a U.S. citizen, a
permanent resident, a corporation incorporated in the United States, or an
unincorporated association consisting of mostly U.S. citizens or permanent
residents. FISA, 50 U.S.C. § 1801(1) (2000).
Standards
Limits: The neg overlimits, which are bad for debate and kills
education, because it does not allow us to truly learn about
affirmative plans that are main parts of the literature bases and
really understand the topic. Our aff is an example of domestic
surveillance of U.S. person and is an integral part of all U.S.
domestic surveillance
PRISM is the biggest issue within domestic surveillance
CFR 13 (Council on Foreign Relations, an independent, nonpartisan membership
organization, think tank, and publisher, U.S. Domestic Surveillance,
http://www.cfr.org/intelligence/us-domestic-surveillance/p9763 )
In the wake of the September 11 attacks, Congress passed sweeping legislation to bolster U.S. counterterrorism efforts. Some of the
most controversial measures, including the 2001 USA PATRIOT Act, significantly enhanced the federal government's ability to
collect and analyze private information related to U.S. citizens. Proponents argue that the broader surveillance authorities are
required to uncover and neutralize terrorism plots, while critics say the expanded powers infringe on civil liberties. In 2005, the
Bush administration came under fire from Democrats and activist groups after press reports disclosed the National Security
Agency's warrantless wiretapping program. In 2013, the Obama administration similarly attracted criticism from watchdog groups
upon leaks related to its far-reaching domestic surveillance activities under the NSA. The episode has revived debate over privacy
and national security and raised calls for reform. What
is the domestic surveillance controversy
under Obama? Two NSA surveillance programs were exposed in press
reports in June 2013. First, a Guardian report disclosed a classified Foreign Intelligence Surveillance
Court (FISC)
order instructing Verizon, one of the largest U.S. telecommunications firms, to hand
over phone records of millions of Americans to the NSA. Another secret
program, code-named PRISM, accessed troves of communication data—audio/video chats,
emails, photos, and other media—from several U.S. technology companies, according to the
Washington Post. Subsequent leaks revealed details on additional programs that gave the NSA extensive electronic surveillance
tools, both domestic and international, allowing the government to track and tap into conversations of suspected terrorists, civilians,
and even friendly foreign heads of state. Amid criticism from civil rights groups, the Obama administration initially defended the
surveillance program, saying it is legal, limited, and effective in preventing terrorist attacks. Director of National Intelligence James
Clapper said the program does not monitor phone calls, but acquires telephony metadata to be queried only when there is a
"reasonable suspicion" of links to a foreign terrorist organization. Experts say the White House is likely relying on Section 215 of the
Patriot Act, a provision that says government can mandate the turnover of "any tangible things" from any entity as long as the items
are for an investigation to defend against international terrorism or spying. In congressional testimony, NSA chief Gen. Keith
Alexander credited his agency's surveillance with helping prevent "dozens" of terrorist attacks, and said he welcomed a debate on the
legality of the programs. In August, President Obama created a task force of intelligence and legal experts to review NSA operations
and recommend potential reforms. The inquiry is reportedly part of a comprehensive White House review of signals intelligence.
What was the domestic surveillance controversy under Bush? After 9/11, the Bush administration opted not to seek approval from
the FISC before intercepting "international communications into and out of the United States of persons linked to al-Qaeda (PDF) or
related terrorist organizations." The special secret court, set up in 1978 following previous administrations' domestic spying abuses,
was designed to act as a neutral overseer in granting government agencies surveillance authorization. After the NSA program was
revealed by the New York Times in late 2005, former attorney general Alberto R. Gonzales argued (PDF) that President Bush had
the legal authority under the constitution and congressional statute to conduct warrantless surveillance on U.S. persons "reasonably
believed to be linked to al-Qaeda." The 2001 Authorization for Use of Military Force (AUMF), without specifically mentioning
wiretapping, grants the president broad authority to use all necessary force "against those nations, organizations, or persons he
determines planned, authorized, committed, or aided the [9/11] terrorist attacks." This includes, administration officials say, the
powers to secretly gather domestic intelligence on al-Qaeda and associated groups. The Bush administration maintained that the
Foreign Intelligence Surveillance Act (FISA) was an outdated law-enforcement mechanism that was too time-consuming given the
highly fluid, modern threat environment. Administration officials portrayed the NSA program as an "early warning system" (PDF)
with "a military nature that requires speed and agility." Moreover, the White House stressed that the program was one not of
domestic surveillance but of monitoring terrorists abroad, and publicly referred to the operation as the "Terrorist Surveillance
Program." Opponents of the program referred to it as "domestic spying." Under congressional pressure, Gonzales announced in
January 2007 plans to disband the warrantless surveillance program and cede oversight to FISC, but questions about the legality of
the program lingered in Congress and Gonzales resigned months later. But Washington's vow to seek FISA approval for domestic
surveillance was short-lived. In July 2007--weeks before Gonzales stepped down--intelligence officials pressed lawmakers for
emergency legislation to broaden their wiretapping authority following a ruling by the court overseeing FISA that impacted the
government's ability to intercept foreign communications passing through telecommunications "switches" on U.S. soil. In August,
President Bush signed the Protect America Act of 2007, which gave the attorney general and the director of national intelligence
temporary power to approve international surveillance, rather than the special intelligence court. It also said warrants are
unnecessary for surveillance of a person "reasonably believed" to be located overseas. This six-month stopgap measure expired in
early 2008, but the FISA Amendment Act passed just months later contained similar provisions. President Obama reauthorized this
legislation for five more years in December 2012. Why did this become an issue in mid-2013? Edward Snowden, the ex-CIA and
former NSA contractor who leaked news of the two NSA programs, cited concerns over civil liberties violations as his primary
motive. "The NSA has built an infrastructure that allows it to intercept almost everything. With this capability, the vast majority of
human communications are automatically ingested without targeting. If I wanted to see your emails or your wife's phone, all I have
to do is use intercepts. I can get your emails, passwords, phone records, credit cards," he said in an interview with the Guardian.
However, DNI Director Clapper publicly denied initial media reports (PDF) that the PRISM surveillance program was "an
undisclosed collection or data mining program" that unilaterally taps into servers of U.S. telecoms. Rather, he stated the NSA
program was limited and had been "widely known and publicly discussed since its inception in 2008." Specifically, Clapper said the
program operated under Section 702 of FISA that permits the targeting of non-U.S. persons abroad without individualized court
orders. As noted above, President Obama has reauthorized this legislation until 2017. Many U.S. lawmakers have pressed for
Snowden's prosecution, and the Obama administration referred his case to the Justice Department. Snowden fled to Hong Kong in
May and was granted temporary asylum in Russia in August after spending weeks at the Moscow airport. What are the challenges to
domestic surveillance policy? Both Democratic and Republican lawmakers have called for a reexamination of the government's
broad surveillance powers in the wake of disclosures regarding NSA activities. Top-ranking Senators Dianne Feinstein (D-CA) and
John McCain (R-AZ) supported requests for congressional hearings on NSA surveillance, despite their support for the controversial
programs. Sen. Ron Wyden (D-OR), an outspoken critic of NSA's broad authorities, has called on the White House to detail the
extent to which Americans were monitored. In the past, the NSA said it lacked the technical ability to quantify this data. Critics
allege that even if the programs are operating within the letter of law, as the Obama administration says, they violate the law's intent
and the values of democratic society. Some civil liberties activists have appealed for a thorough review of several provisions in the
Patriot Act and FISA Amendments Act that provide controversial surveillance authorities. Civil libertarians question whether
government surveillance programs violate the Fourth Amendment to the U.S. Constitution, which states: "The right of the people to
be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no
Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be
searched, and the persons or things to be seized." In December, Judge Richard J. Leon of the Federal District Court for the District
of Columbia ruled that the NSA's bulk gathering of U.S. telephone metadata likely violates the Constitution. "Surely, such a program
infringes on 'that degree of privacy' that the founders enshrined in the Fourth Amendment," he wrote. The judge ordered the
government to stop collecting data on calls of the two plaintiffs in the case, but stayed the injunction to allow the government a
chance to appeal. Other legal challenges are in early phases, including suits by the American Civil Liberties Union and the Electronic
Frontier Foundation. The Obama administration's task force also released its findings in December, recommending dozens of
changes to current surveillance practice. Significant proposed reforms include: ending the government's indiscrimate collection of
U.S. telephone metadata and requiring authorities to obtain a court order to query this information, held in the private sector;
placing new limits on the monitoring of foreign leaders and ordinary non-Americans; and supporting new encryption standards and
technologies. But legal analysts say that while the recommendations, if implemented, would require greater executive, congressional,
and judicial review of surveillance activities, they would end few programs. Meanwhile, in Congress, two bills that would forbid the
NSA from collecting phone data on Americans not suspected of a crime are still in the early legislative process. The USA Freedom
Act, which would reform the Patriot Act to address privacy concerns, has enough support to pass, but lawmakers are uncertain when
it will be ready for a vote. Still, many Democrats and Republicans say the NSA programs are essential counterterrorism tools that
have proved effective in preventing potential attacks.
Ground: You can still garner all your DA’s or CP, because we are
still about U.S. citizens and we do not encroach on anything the
neg can run
Extra Topicality – In all types of surveillance there are domestic
and foreign surveillance intertwined within, so it is almost
impossible to curtail only domestic surveillance without foreign
surveillance. Again this definition overlimits because it would be
impossible for an aff to come up with something that only affects
the domestic side of the ball
Curtail – complete stop
C/I – Definition reduce:
Curtail means to reduce
American Heritage, 15 (‘curtail’,
https://www.ahdictionary.com/word/search.html?q=curtail
cur·tail (kər-tāl
)
tr.v. cur·tailed, cur·tail·ing, cur·tails
To cut short or reduce: We curtailed our conversation when other people entered the
room. See Synonyms at shorten.
C/I - Definition Regulate:
Curtail means impose a restriction
Oxford Dictionaries, 15 (“curtail”,
http://www.oxforddictionaries.com/us/definition/american_english/curtail)
Definition of curtail in English: verb [WITH OBJECT] 1Reduce in extent or
quantity; impose a restriction on: civil liberties were further curtailed
Curtail means place restrictions on
Vocabulary.com, 15 (‘curtail’ http://www.vocabulary.com/dictionary/curtail
DEFINITIONS OF: curtail v place restrictions on “curtail drinking in school”
Synonyms: curb, cut back, restrict
The Levi Guidelines ‘curtailed’ domestic intelligence gathering
Berman, 14 - Visiting Assistant Professor of Law, Brooklyn Law School (Emily
Berman, Regulating Domestic Intelligence Collection, 71 Wash. & Lee L. Rev. 3,
http://scholarlycommons.law.wlu.edu/wlulr/vol71/iss1/5
Since the FBI’s inception, there has been tension embedded in its mission. It is charged
not only with solving crimes but also with preventing them.26 While the two goals often
complement one another, they call for very different types of investigative activities.
Focus on crime solving argues for a set of investigative powers enabling inquiries into
specific acts, with an eye toward successful prosecution of the perpetrators.27
Preventive work, by contrast, requires the collection of much broader swaths of
information—information about illicit organizations, their members, their goals, their
capacities, and their sources of funding as well as information about possible targets.28
Over time, both the Bureau’s focus and the rules governing its activities have swung
back and forth along the spectrum between the targeted investigations of crime solving
and the broader intelligence gathering associated with prevention. The Guidelines
themselves are the product of the FBI’s early-1970s move away from intelligence
collection. After the United States Senate Select Committee to Study Governmental
Operations with Respect to Intelligence Activities, commonly known as the Church
Committee for its chair Senator Frank Church (D-ID), revealed that decades of
unregulated intelligence collection by the FBI had resulted in widespread abuses of the
government’s investigative powers,29 Congress determined that the FBI should
be subject to a legislative charter setting out strict limits on its intelligencecollection authority.30 In an effort to stave off potentially more restrictive
legislative action, President Gerald Ford’s Attorney General, Edward Levi,
issued in 1976 the first set of Attorney General’s Guidelines—known as the Levi
Guidelines.31
The Levi Guidelines strictly curtailed domestic intelligence investigations
through a basic regulatory structure that subsequent versions of the Guidelines
have largely retained.32 This structure consists of multiple investigative levels. For each
successive level, a higher threshold of suspicion is necessary to proceed; the
investigative tools agents may use are more intrusive; and procedural safeguards, such
as the need for supervisory approval and limits on the temporal length of investigations,
are more robust.33 The Guidelines continue to function as the primary
constraint on the FBI’s operations and remain a justification for the lack of a
statutory charter governing the FBI’s activities, but they have not remained static.34
Multiple modifications made in the years between 1976 and 2001 eased, though
ultimately retained, restrictions on intelligence collection.35
AT: Friman and Andreas – no where in these cards does it say
that curtail requires a complete stop of flow within the internet.
Prefer our definition actually specifies that curtail is a
restriction
Standards
Limits: The neg overlimits, overlimits are bad for debate because
it does not allow us to truly learn about affirmative plans that are
main parts of the literature bases and really understand the
topic. Our aff is an example of curtailment, there is not one aff
that completely stops domestic surveillance
PRISM is the biggest issue within domestic surveillance
CFR 13 (Council on Foreign Relations, an independent, nonpartisan membership
organization, think tank, and publisher, U.S. Domestic Surveillance,
http://www.cfr.org/intelligence/us-domestic-surveillance/p9763 )//NC
In the wake of the September 11 attacks, Congress passed sweeping legislation to bolster U.S. counterterrorism efforts. Some of the
most controversial measures, including the 2001 USA PATRIOT Act, significantly enhanced the federal government's ability to
collect and analyze private information related to U.S. citizens. Proponents argue that the broader surveillance authorities are
required to uncover and neutralize terrorism plots, while critics say the expanded powers infringe on civil liberties. In 2005, the
Bush administration came under fire from Democrats and activist groups after press reports disclosed the National Security
Agency's warrantless wiretapping program. In 2013, the Obama administration similarly attracted criticism from watchdog groups
upon leaks related to its far-reaching domestic surveillance activities under the NSA. The episode has revived debate over privacy
and national security and raised calls for reform. What
is the domestic surveillance controversy
under Obama? Two NSA surveillance programs were exposed in press
reports in June 2013. First, a Guardian report disclosed a classified Foreign Intelligence Surveillance
Court (FISC) order instructing Verizon, one of the largest U.S. telecommunications firms, to hand
over phone records of millions of Americans to the NSA. Another secret
program, code-named PRISM, accessed troves of communication data—audio/video chats,
emails, photos, and other media—from several U.S. technology companies, according to the
Washington Post. Subsequent leaks revealed details on additional programs that gave the NSA extensive electronic surveillance
tools, both domestic and international, allowing the government to track and tap into conversations of suspected terrorists, civilians,
and even friendly foreign heads of state. Amid criticism from civil rights groups, the Obama administration initially defended the
surveillance program, saying it is legal, limited, and effective in preventing terrorist attacks. Director of National Intelligence James
Clapper said the program does not monitor phone calls, but acquires telephony metadata to be queried only when there is a
"reasonable suspicion" of links to a foreign terrorist organization. Experts say the White House is likely relying on Section 215 of the
Patriot Act, a provision that says government can mandate the turnover of "any tangible things" from any entity as long as the items
are for an investigation to defend against international terrorism or spying. In congressional testimony, NSA chief Gen. Keith
Alexander credited his agency's surveillance with helping prevent "dozens" of terrorist attacks, and said he welcomed a debate on the
legality of the programs. In August, President Obama created a task force of intelligence and legal experts to review NSA operations
and recommend potential reforms. The inquiry is reportedly part of a comprehensive White House review of signals intelligence.
What was the domestic surveillance controversy under Bush? After 9/11, the Bush administration opted not to seek approval from
the FISC before intercepting "international communications into and out of the United States of persons linked to al-Qaeda (PDF) or
related terrorist organizations." The special secret court, set up in 1978 following previous administrations' domestic spying abuses,
was designed to act as a neutral overseer in granting government agencies surveillance authorization. After the NSA program was
revealed by the New York Times in late 2005, former attorney general Alberto R. Gonzales argued (PDF) that President Bush had
the legal authority under the constitution and congressional statute to conduct warrantless surveillance on U.S. persons "reasonably
believed to be linked to al-Qaeda." The 2001 Authorization for Use of Military Force (AUMF), without specifically mentioning
wiretapping, grants the president broad authority to use all necessary force "against those nations, organizations, or persons he
determines planned, authorized, committed, or aided the [9/11] terrorist attacks." This includes, administration officials say, the
powers to secretly gather domestic intelligence on al-Qaeda and associated groups. The Bush administration maintained that the
Foreign Intelligence Surveillance Act (FISA) was an outdated law-enforcement mechanism that was too time-consuming given the
highly fluid, modern threat environment. Administration officials portrayed the NSA program as an "early warning system" (PDF)
with "a military nature that requires speed and agility." Moreover, the White House stressed that the program was one not of
domestic surveillance but of monitoring terrorists abroad, and publicly referred to the operation as the "Terrorist Surveillance
Program." Opponents of the program referred to it as "domestic spying." Under congressional pressure, Gonzales announced in
January 2007 plans to disband the warrantless surveillance program and cede oversight to FISC, but questions about the legality of
the program lingered in Congress and Gonzales resigned months later. But Washington's vow to seek FISA approval for domestic
surveillance was short-lived. In July 2007--weeks before Gonzales stepped down--intelligence officials pressed lawmakers for
emergency legislation to broaden their wiretapping authority following a ruling by the court overseeing FISA that impacted the
government's ability to intercept foreign communications passing through telecommunications "switches" on U.S. soil. In August,
President Bush signed the Protect America Act of 2007, which gave the attorney general and the director of national intelligence
temporary power to approve international surveillance, rather than the special intelligence court. It also said warrants are
unnecessary for surveillance of a person "reasonably believed" to be located overseas. This six-month stopgap measure expired in
early 2008, but the FISA Amendment Act passed just months later contained similar provisions. President Obama reauthorized this
legislation for five more years in December 2012. Why did this become an issue in mid-2013? Edward Snowden, the ex-CIA and
former NSA contractor who leaked news of the two NSA programs, cited concerns over civil liberties violations as his primary
motive. "The NSA has built an infrastructure that allows it to intercept almost everything. With this capability, the vast majority of
human communications are automatically ingested without targeting. If I wanted to see your emails or your wife's phone, all I have
to do is use intercepts. I can get your emails, passwords, phone records, credit cards," he said in an interview with the Guardian.
However, DNI Director Clapper publicly denied initial media reports (PDF) that the PRISM surveillance program was "an
undisclosed collection or data mining program" that unilaterally taps into servers of U.S. telecoms. Rather, he stated the NSA
program was limited and had been "widely known and publicly discussed since its inception in 2008." Specifically, Clapper said the
program operated under Section 702 of FISA that permits the targeting of non-U.S. persons abroad without individualized court
orders. As noted above, President Obama has reauthorized this legislation until 2017. Many U.S. lawmakers have pressed for
Snowden's prosecution, and the Obama administration referred his case to the Justice Department. Snowden fled to Hong Kong in
May and was granted temporary asylum in Russia in August after spending weeks at the Moscow airport. What are the challenges to
domestic surveillance policy? Both Democratic and Republican lawmakers have called for a reexamination of the government's
broad surveillance powers in the wake of disclosures regarding NSA activities. Top-ranking Senators Dianne Feinstein (D-CA) and
John McCain (R-AZ) supported requests for congressional hearings on NSA surveillance, despite their support for the controversial
programs. Sen. Ron Wyden (D-OR), an outspoken critic of NSA's broad authorities, has called on the White House to detail the
extent to which Americans were monitored. In the past, the NSA said it lacked the technical ability to quantify this data. Critics
allege that even if the programs are operating within the letter of law, as the Obama administration says, they violate the law's intent
and the values of democratic society. Some civil liberties activists have appealed for a thorough review of several provisions in the
Patriot Act and FISA Amendments Act that provide controversial surveillance authorities. Civil libertarians question whether
government surveillance programs violate the Fourth Amendment to the U.S. Constitution, which states: "The right of the people to
be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no
Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be
searched, and the persons or things to be seized." In December, Judge Richard J. Leon of the Federal District Court for the District
of Columbia ruled that the NSA's bulk gathering of U.S. telephone metadata likely violates the Constitution. "Surely, such a program
infringes on 'that degree of privacy' that the founders enshrined in the Fourth Amendment," he wrote. The judge ordered the
government to stop collecting data on calls of the two plaintiffs in the case, but stayed the injunction to allow the government a
chance to appeal. Other legal challenges are in early phases, including suits by the American Civil Liberties Union and the Electronic
Frontier Foundation. The Obama administration's task force also released its findings in December, recommending dozens of
changes to current surveillance practice. Significant proposed reforms include: ending the government's indiscrimate collection of
U.S. telephone metadata and requiring authorities to obtain a court order to query this information, held in the private sector;
placing new limits on the monitoring of foreign leaders and ordinary non-Americans; and supporting new encryption standards and
technologies. But legal analysts say that while the recommendations, if implemented, would require greater executive, congressional,
and judicial review of surveillance activities, they would end few programs. Meanwhile, in Congress, two bills that would forbid the
NSA from collecting phone data on Americans not suspected of a crime are still in the early legislative process. The USA Freedom
Act, which would reform the Patriot Act to address privacy concerns, has enough support to pass, but lawmakers are uncertain when
it will be ready for a vote. Still, many Democrats and Republicans say the NSA programs are essential counterterrorism tools that
have proved effective in preventing potential attacks.
Ground: You can still garner all your DA’s or CP, because we are
a reduce which is what these arguments are based off of
Curtail Reduce or decrease
We meet – Our plan specifically claims that we are limiting
domestic surveillance on American companies, which leads to a
reduce of the surveillance we can do upon the domestic
information. Our Eoyang and Kehl evidence both reference that
curtailment by reducing will lead to regaining soft power. So we
are topical
C/I - Definition Regulate:
Curtail means impose a restriction
Oxford Dictionaries, 15 (“curtail”,
http://www.oxforddictionaries.com/us/definition/american_english/curtail)
Definition of curtail in English: verb [WITH OBJECT] 1Reduce in extent or
quantity; impose a restriction on: civil liberties were further curtailed
Curtail means place restrictions on
Vocabulary.com, 15 (‘curtail’ http://www.vocabulary.com/dictionary/curtail
DEFINITIONS OF: curtail v place restrictions on “curtail drinking in school”
Synonyms: curb, cut back, restrict
The Levi Guidelines ‘curtailed’ domestic intelligence gathering
Berman, 14 - Visiting Assistant Professor of Law, Brooklyn Law School (Emily
Berman, Regulating Domestic Intelligence Collection, 71 Wash. & Lee L. Rev. 3,
http://scholarlycommons.law.wlu.edu/wlulr/vol71/iss1/5
Since the FBI’s inception, there has been tension embedded in its mission. It is charged
not only with solving crimes but also with preventing them.26 While the two goals often
complement one another, they call for very different types of investigative activities.
Focus on crime solving argues for a set of investigative powers enabling inquiries into
specific acts, with an eye toward successful prosecution of the perpetrators.27
Preventive work, by contrast, requires the collection of much broader swaths of
information—information about illicit organizations, their members, their goals, their
capacities, and their sources of funding as well as information about possible targets.28
Over time, both the Bureau’s focus and the rules governing its activities have swung
back and forth along the spectrum between the targeted investigations of crime solving
and the broader intelligence gathering associated with prevention. The Guidelines
themselves are the product of the FBI’s early-1970s move away from intelligence
collection. After the United States Senate Select Committee to Study Governmental
Operations with Respect to Intelligence Activities, commonly known as the Church
Committee for its chair Senator Frank Church (D-ID), revealed that decades of
unregulated intelligence collection by the FBI had resulted in widespread abuses of the
government’s investigative powers,29 Congress determined that the FBI should
be subject to a legislative charter setting out strict limits on its intelligencecollection authority.30 In an effort to stave off potentially more restrictive
legislative action, President Gerald Ford’s Attorney General, Edward Levi,
issued in 1976 the first set of Attorney General’s Guidelines—known as the Levi
Guidelines.31
The Levi Guidelines strictly curtailed domestic intelligence investigations
through a basic regulatory structure that subsequent versions of the Guidelines
have largely retained.32 This structure consists of multiple investigative levels. For each
successive level, a higher threshold of suspicion is necessary to proceed; the
investigative tools agents may use are more intrusive; and procedural safeguards, such
as the need for supervisory approval and limits on the temporal length of investigations,
are more robust.33 The Guidelines continue to function as the primary
constraint on the FBI’s operations and remain a justification for the lack of a
statutory charter governing the FBI’s activities, but they have not remained static.34
Multiple modifications made in the years between 1976 and 2001 eased, though
ultimately retained, restrictions on intelligence collection.35
Standards
Limits: The neg overlimits, overlimits are bad for debate because
it does not allow us to truly learn about affirmative plans that are
main parts of the literature bases and really understand the
topic. Our aff is an example of curtailment through regulation to
reduce domestic surveillance, most affs require restrictions to
current laws in order to even result in a decrease
PRISM is the biggest issue within domestic surveillance
CFR 13 (Council on Foreign Relations, an independent, nonpartisan membership
organization, think tank, and publisher, U.S. Domestic Surveillance,
http://www.cfr.org/intelligence/us-domestic-surveillance/p9763 )//NC
In the wake of the September 11 attacks, Congress passed sweeping legislation to bolster U.S. counterterrorism efforts. Some of the
most controversial measures, including the 2001 USA PATRIOT Act, significantly enhanced the federal government's ability to
collect and analyze private information related to U.S. citizens. Proponents argue that the broader surveillance authorities are
required to uncover and neutralize terrorism plots, while critics say the expanded powers infringe on civil liberties. In 2005, the
Bush administration came under fire from Democrats and activist groups after press reports disclosed the National Security
Agency's warrantless wiretapping program. In 2013, the Obama administration similarly attracted criticism from watchdog groups
upon leaks related to its far-reaching domestic surveillance activities under the NSA. The episode has revived debate over privacy
and national security and raised calls for reform. What
is the domestic surveillance controversy
under Obama? Two NSA surveillance programs were exposed in press
reports in June 2013. First, a Guardian report disclosed a classified Foreign Intelligence Surveillance
Court (FISC) order instructing Verizon, one of the largest U.S. telecommunications firms, to hand
over phone records of millions of Americans to the NSA. Another secret
program, code-named PRISM, accessed troves of communication data—audio/video chats,
emails, photos, and other media—from several U.S. technology companies, according to the
Washington Post. Subsequent leaks revealed details on additional programs that gave the NSA extensive electronic surveillance
tools, both domestic and international, allowing the government to track and tap into conversations of suspected terrorists, civilians,
and even friendly foreign heads of state. Amid criticism from civil rights groups, the Obama administration initially defended the
surveillance program, saying it is legal, limited, and effective in preventing terrorist attacks. Director of National Intelligence James
Clapper said the program does not monitor phone calls, but acquires telephony metadata to be queried only when there is a
"reasonable suspicion" of links to a foreign terrorist organization. Experts say the White House is likely relying on Section 215 of the
Patriot Act, a provision that says government can mandate the turnover of "any tangible things" from any entity as long as the items
are for an investigation to defend against international terrorism or spying. In congressional testimony, NSA chief Gen. Keith
Alexander credited his agency's surveillance with helping prevent "dozens" of terrorist attacks, and said he welcomed a debate on the
legality of the programs. In August, President Obama created a task force of intelligence and legal experts to review NSA operations
and recommend potential reforms. The inquiry is reportedly part of a comprehensive White House review of signals intelligence.
What was the domestic surveillance controversy under Bush? After 9/11, the Bush administration opted not to seek approval from
the FISC before intercepting "international communications into and out of the United States of persons linked to al-Qaeda (PDF) or
related terrorist organizations." The special secret court, set up in 1978 following previous administrations' domestic spying abuses,
was designed to act as a neutral overseer in granting government agencies surveillance authorization. After the NSA program was
revealed by the New York Times in late 2005, former attorney general Alberto R. Gonzales argued (PDF) that President Bush had
the legal authority under the constitution and congressional statute to conduct warrantless surveillance on U.S. persons "reasonably
believed to be linked to al-Qaeda." The 2001 Authorization for Use of Military Force (AUMF), without specifically mentioning
wiretapping, grants the president broad authority to use all necessary force "against those nations, organizations, or persons he
determines planned, authorized, committed, or aided the [9/11] terrorist attacks." This includes, administration officials say, the
powers to secretly gather domestic intelligence on al-Qaeda and associated groups. The Bush administration maintained that the
Foreign Intelligence Surveillance Act (FISA) was an outdated law-enforcement mechanism that was too time-consuming given the
highly fluid, modern threat environment. Administration officials portrayed the NSA program as an "early warning system" (PDF)
with "a military nature that requires speed and agility." Moreover, the White House stressed that the program was one not of
domestic surveillance but of monitoring terrorists abroad, and publicly referred to the operation as the "Terrorist Surveillance
Program." Opponents of the program referred to it as "domestic spying." Under congressional pressure, Gonzales announced in
January 2007 plans to disband the warrantless surveillance program and cede oversight to FISC, but questions about the legality of
the program lingered in Congress and Gonzales resigned months later. But Washington's vow to seek FISA approval for domestic
surveillance was short-lived. In July 2007--weeks before Gonzales stepped down--intelligence officials pressed lawmakers for
emergency legislation to broaden their wiretapping authority following a ruling by the court overseeing FISA that impacted the
government's ability to intercept foreign communications passing through telecommunications "switches" on U.S. soil. In August,
President Bush signed the Protect America Act of 2007, which gave the attorney general and the director of national intelligence
temporary power to approve international surveillance, rather than the special intelligence court. It also said warrants are
unnecessary for surveillance of a person "reasonably believed" to be located overseas. This six-month stopgap measure expired in
early 2008, but the FISA Amendment Act passed just months later contained similar provisions. President Obama reauthorized this
legislation for five more years in December 2012. Why did this become an issue in mid-2013? Edward Snowden, the ex-CIA and
former NSA contractor who leaked news of the two NSA programs, cited concerns over civil liberties violations as his primary
motive. "The NSA has built an infrastructure that allows it to intercept almost everything. With this capability, the vast majority of
human communications are automatically ingested without targeting. If I wanted to see your emails or your wife's phone, all I have
to do is use intercepts. I can get your emails, passwords, phone records, credit cards," he said in an interview with the Guardian.
However, DNI Director Clapper publicly denied initial media reports (PDF) that the PRISM surveillance program was "an
undisclosed collection or data mining program" that unilaterally taps into servers of U.S. telecoms. Rather, he stated the NSA
program was limited and had been "widely known and publicly discussed since its inception in 2008." Specifically, Clapper said the
program operated under Section 702 of FISA that permits the targeting of non-U.S. persons abroad without individualized court
orders. As noted above, President Obama has reauthorized this legislation until 2017. Many U.S. lawmakers have pressed for
Snowden's prosecution, and the Obama administration referred his case to the Justice Department. Snowden fled to Hong Kong in
May and was granted temporary asylum in Russia in August after spending weeks at the Moscow airport. What are the challenges to
domestic surveillance policy? Both Democratic and Republican lawmakers have called for a reexamination of the government's
broad surveillance powers in the wake of disclosures regarding NSA activities. Top-ranking Senators Dianne Feinstein (D-CA) and
John McCain (R-AZ) supported requests for congressional hearings on NSA surveillance, despite their support for the controversial
programs. Sen. Ron Wyden (D-OR), an outspoken critic of NSA's broad authorities, has called on the White House to detail the
extent to which Americans were monitored. In the past, the NSA said it lacked the technical ability to quantify this data. Critics
allege that even if the programs are operating within the letter of law, as the Obama administration says, they violate the law's intent
and the values of democratic society. Some civil liberties activists have appealed for a thorough review of several provisions in the
Patriot Act and FISA Amendments Act that provide controversial surveillance authorities. Civil libertarians question whether
government surveillance programs violate the Fourth Amendment to the U.S. Constitution, which states: "The right of the people to
be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no
Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be
searched, and the persons or things to be seized." In December, Judge Richard J. Leon of the Federal District Court for the District
of Columbia ruled that the NSA's bulk gathering of U.S. telephone metadata likely violates the Constitution. "Surely, such a program
infringes on 'that degree of privacy' that the founders enshrined in the Fourth Amendment," he wrote. The judge ordered the
government to stop collecting data on calls of the two plaintiffs in the case, but stayed the injunction to allow the government a
chance to appeal. Other legal challenges are in early phases, including suits by the American Civil Liberties Union and the Electronic
Frontier Foundation. The Obama administration's task force also released its findings in December, recommending dozens of
changes to current surveillance practice. Significant proposed reforms include: ending the government's indiscrimate collection of
U.S. telephone metadata and requiring authorities to obtain a court order to query this information, held in the private sector;
placing new limits on the monitoring of foreign leaders and ordinary non-Americans; and supporting new encryption standards and
technologies. But legal analysts say that while the recommendations, if implemented, would require greater executive, congressional,
and judicial review of surveillance activities, they would end few programs. Meanwhile, in Congress, two bills that would forbid the
NSA from collecting phone data on Americans not suspected of a crime are still in the early legislative process. The USA Freedom
Act, which would reform the Patriot Act to address privacy concerns, has enough support to pass, but lawmakers are uncertain when
it will be ready for a vote. Still, many Democrats and Republicans say the NSA programs are essential counterterrorism tools that
have proved effective in preventing potential attacks.
Ground: You can still garner all your DA’s or CP, because we are
a reduce which is what these arguments are based off of
Other definitions for domestic
A US persons standard avoids the problems with geographic
limits on the internet
Donohue, 15 - Professor of Law, Georgetown University Law Center (Laura,
“SECTION 702 AND THE COLLECTION OF INTERNATIONAL TELEPHONE AND
INTERNET CONTENT” 38 Harv. J.L. & Pub. Pol'y 117, Winter, lexis)
To the extent that the interception of U.S. persons' communications
constitutes a search or seizure within the meaning of the Fourth
Amendment, it would appear that, at least at the front [*230] end, U.S.
persons are entitled to protections. n456 The inspection and collection of
content falls within the meaning of a search and seizure under the Fourth
Amendment. Just as virtual entry into the United States should not matter for
purposes of setting a threshold for application of the Fourth Amendment to aliens, use
of global communications should not thereby divest U.S. persons of their
constitutional protections. This approach is consistent with the geographic focus of
the Courts in regard to the Fourth Amendment. It does not hinge constitutional
protections on movement along global communications networks--itself an
untenable proposition in light of how information flows over the Internet. If the
courts, for instance, were to construct a rule that said that U.S. persons
sending information outside the United States lose the protections of the
Fourth Amendment in the privacy afforded those communications, it would be
difficult to police. This rule assumes that individuals have control over
whether their communications leave domestic bounds. They do not. The
Internet is constructed to find the most efficient route between two ISP
addresses. This means that even domestic communications may be routed
internationally. Individuals have no control over how their messages are
conveyed. At the back end, the government would have to be able to ascertain which
messages originated within the United States and then left U.S. bounds. But the NSA
claims that it does not have the appropriate technologies to make this call. As a result,
the effect of this rule would essentially be to assume that every time a U.S. person
communicates, she loses constitutional protections in the content of those
communications. This would eviscerate the meaning of the Fourth Amendment. It
would assume that U.S. persons have no reasonable expectation of privacy in their
communications, regardless of whether they flow across international borders. The
Supreme Court can avoid this conclusion by underscoring the status of the
individual as Rehnquist articulated for the majority in Verdugo-Urquidez:
emphasizing membership in the political community. Where established,
the protection of the Fourth Amendment applies.
The NSA intercepts upstream data by tapping directly into US
service providers
Donohue, 15 - Professor of Law, Georgetown University Law Center (Laura,
“SECTION 702 AND THE COLLECTION OF INTERNATIONAL TELEPHONE AND
INTERNET CONTENT” 38 Harv. J.L. & Pub. Pol'y 117, Winter, lexis)
A follow-up article two days later printed another slide depicting both PRISM
and "upstream" collection of communications on fiber cables and
infrastructure ("[c]ollection directly from the servers of . . . U.S. Service
Providers.") n8 Upstream interception allowed the NSA to acquire Internet
communications "as they [*121] transit the 'internet backbone' facilities." n9
The NSA could collect all traffic crossing Internet cables--not just
information targeted at specific Internet Protocol (IP) addresses or telephone
number. The potential yield was substantial: in the first six months of 2011, the NSA
acquired more than 13.25 million Internet transactions through its upstream collection.
n10 The slide urged analysts to use both PRISM and upstream collection to obtain
information. n11 Within days of the releases, the intelligence community acknowledged
the existence of the programs. n12 In August 2013 the Director of National Intelligence,
James Clapper, offered further confirmation, noting that PRISM had been in operation
since Congress had passed the 2008 FISA Amendments Act. n13 He declassified eight
documents, n14 and by the end of the month, he had announced that the intelligence
community would release the total [*122] number of Section 702 orders issued, and
targets thereby affected, on an annual basis. n15 NSA interpretation of the FAA means
in practice PRISM targets domestic communications Donohue, 15 - Professor of Law,
Georgetown University Law Center (Laura, “SECTION 702 AND THE COLLECTION OF
INTERNATIONAL TELEPHONE AND INTERNET CONTENT” 38 Harv. J.L. & Pub.
Pol'y 117, Winter, lexis) FAA = 2008 FISA Amendments Act The Article next turns
to statutory issues related to targeting, post-targeting analysis, and the retention and
dissemination of information. It argues that the NSA has sidestepped FAA
restrictions by adopting procedures that allow analysts to acquire
information not just to or from, but also "about" targets. In its foreignness
determination the agency assumes, absent evidence to the contrary, that
the target is a non-U.S. person located outside domestic bounds. And weak
standards mark the foreign intelligence purpose determination. Together,
these elements allow for the broad collection of U.S. persons' international
communications, even as they open the door to the interception of domestic
communications. In regard to post-targeting analysis, the Article draws attention to
the intelligence community's use of U.S. person information to query data
obtained under Section 702, effectively bypassing protections Congress
introduced to prevent reverse targeting. The Article further notes in relation to
retention and dissemination that increasing consumer and industrial reliance on
cryptography means that the NSA's retention of encrypted data may soon
become the exception that swallows the rule. In its constitutional analysis, the
Article finds certain practices instituted under Section 702 to fall outside acceptable
Fourth Amendment bounds. Although lower courts had begun to recognize a domestic
foreign intelligence exception to the warrant clause, in 1978 Congress introduced FISA
to be the sole means via which domestic foreign intelligence electronic intercepts could
be undertaken. Consistent with separation of powers doctrine, this shift carried
constitutional meaning. Internationally, practice and precedent prior to the FAA turned
on a foreign intelligence exception. But in 2008 Congress altered the status quo,
introducing individualized judicial review into the process. Like FISA, the FAA
carried constitutional import. [*124] If that were the end of the story, one could argue
that the incidental collection of U.S. persons' information, as well as the interception of
domestic conversations ought to be regarded in Justice Jackson's third category under
Youngstown Sheet & Tube Co. v. Sawyer. n18 Renewal in 2012, however, points in the
opposite direction. The NSA's actions, for purposes of the warrant clause,
appear to be constitutionally sufficient insofar as foreign intelligence
gathering to or from non-U.S. persons is concerned. The tipping point comes
with regard to criminal prosecution. Absent a foreign intelligence purpose,
there is no exception to the warrant requirement for the query of U.S.
persons' international or domestic communications. Although a warrant is not
required for foreign intelligence collection overseas, the interception of communications
under Section 702 must still comport with the reasonableness requirements of the
Fourth Amendment. A totality of the circumstances test, in which the significant
governmental interest in national security is weighed against the potential intrusion into
U.S. persons' privacy, applies. The incidental collection of large quantities of
U.S. persons' international communications, the scanning of content for
information "about" non-U.S. person targets, and the interception of nonrelevant and entirely domestic communications in multi-communication
transactions, as well as the query of data using U.S. person identifiers, fall
outside the reasonableness component of the Fourth Amendment. The
Article concludes by calling for renewed efforts to draw a line between
foreign intelligence gathering and criminal law and to create higher
protections for U.S. persons, to ensure that the United States can continue
to collect critical information, while remaining consistent with the right to
privacy embedded in the Fourth Amendment.
NSA overreach means it inevitably monitors domestic internet
communications – rerouting, MCTs, and ‘about’
communications
Donohue, 15 - Professor of Law, Georgetown University Law Center (Laura,
“SECTION 702 AND THE COLLECTION OF INTERNATIONAL TELEPHONE AND
INTERNET CONTENT” 38 Harv. J.L. & Pub. Pol'y 117, Winter, lexis)
Three points related to the volume and intrusiveness of the resulting surveillance
deserve notice. First, to obtain "about" communications, because of how the
Internet is constructed, the NSA must monitor large amounts of data. n180
That is, if the NSA may [*163] collect not just e-mail to or from the target's email account (badguy@ISP.com), but, in addition, other communications
happening to mention badguy@ISP.com that pass through the collection
point, then the NSA is monitoring a significant amount of traffic. And the
agency is not just considering envelope information (for example, messages in
which the selector is sending, receiving, or copied on the communication) but the
actual content of messages. n181 Second, wholly domestic conversations may
become swept up in the surveillance simply by nature of how the Internet is
constructed. Everything one does online involves packets of information.
Every Web site, every e-mail, every transfer of documents takes the
information involved and divides it up into small bundles. Limited in size,
these packets contain information about the sender's IP address, the
intended receiver's IP address, something that indicates how many packets
the communication has been divvied up into, and what number in the chain
is represented by the packet in question. n182 Packet switched networks ship this
information to a common destination via the most expedient route--one that may, or
may not, include the other packets of information contained in the message. If a
roadblock or problem arises in the network, the packets can then be re-routed, to reach
their final destination. Domestic messages may thus be routed through
international servers, if that is the most efficient route to the final
destination. What this means is that even if the NSA applies an IP filter to
eliminate communications that appear to be within the United States, it may
nevertheless monitor domestic conversations by nature of them being
routed through foreign servers. In this manner, a student in Chicago may
send an e-mail to a student in Boston [*164] that gets routed through a
server in Canada. Through no intent or design of the individual in Chicago, the
message becomes international and thus subject to NSA surveillance. Third,
further collection of domestic conversations takes place through the NSA's
intercept of what are called multi-communication transactions, or MCTs. It
is important to distinguish here between a transaction and a communication. Some
transactions have only single communications associated with them. These are referred
to as SCTs. Other transactions contain multiple communications. If even one of the
communications in an MCT falls within the NSA's surveillance, all of the
communications bundled into the MCT are collected. The consequence is of significant
import. FISC estimated in 2011 that somewhere between 300,000 and 400,000
MCTs were being collected annually on the basis of "about"
communication--where the "active user" was not the target. So hundreds of
thousands of communications were being collected that did not include the
target as either the sender or the recipient of the communication. n183
PRISM allows reverse-targeting: targeting someone outside the
United States to collect information about someone in the United
States
Donohue, 15 - Professor of Law, Georgetown University Law Center (Laura,
“SECTION 702 AND THE COLLECTION OF INTERNATIONAL TELEPHONE AND
INTERNET CONTENT” 38 Harv. J.L. & Pub. Pol'y 117, Winter, lexis)
B. Post-Targeting Analysis Section 702 makes it illegal to target someone
outside the United States, where the purpose of the acquisition is to obtain
information about a person known to be within domestic bounds. This
practice, known as "reverse targeting," was central to Congressional
debates. n308 Representative Langevin explained that the insertion of FISC would
"ensure that the government's efforts are not aimed at targeting Americans, the socalled reverse targeting that we're all concerned about; and that if an American's
communications is [sic] inadvertently intercepted, it is dealt with in a manner that
guarantees legal protections." n309 Despite Congress' concern about reverse
targeting, the NSA instituted and the FISC approved a rule change in October
2011 to make it possible to query the content of communications obtained
under Section 702 using U.S. person names and identifiers for information
obtained via PRISM and upstream telephony collection. n310 [*196] The
relevant definition in the 2011 minimization procedures is largely consistent with its
2009 predecessor: Identification of a United States person means the name, unique
title, address, or other personal identifier of a United States person in the context of
activities conducted by that person or activities conducted by others that are related to
that person. A reference to a product by brand name, or manufacturer's name or the use
of a name in a descriptive sense, e.g., "Monroe Doctrine," is not an identification of a
United States person. n311 The NSA may query data obtained under Section 702
by using the names, titles, or addresses of U.S. persons, or any other
information that may be related to the individual and his or her activities. If
the intelligence community would like to query the data based on, for instance,
membership in the Council on Foreign Relations--on the grounds that such queries are
likely to yield foreign intelligence information--it may now do so. In March 2014, the
Director of National Intelligence, James Clapper, confirmed in a letter to Senator
Ron Wyden that the [*197] NSA had queried Section 702 data "using U.S.
person identifiers." n312 The following month, the NSA's Privacy and Civil Liberties
Officer reiterated Clapper's statement. n313 Pressed during a June 2014 hearing for the
number of queries using U.S. person identifiers, Clapper responded by noting that in
2013, the NSA approved 198 U.S. person identifiers for querying the content of Section
702 communications, even as it queried Section-702-acquired metadata approximately
9,500 times. n314 FISC has upheld the reading of the statute supporting use of U.S.
person identifiers. n315 In its October 2011 opinion, the Court explained: The
procedures previously approved by the Court effectively impose a wholesale bar on
queries using United States-Person identifiers. The government has broadened Section
3(b)(5) to allow NSA to query the vast majority of its Section 702 collection using United
States-Person identifiers, subject to approval pursuant to internal NSA procedures and
oversight by the Department of Justice. Like all other NSA queries of the Section 702
collection, queries using United States-person identifiers would be limited to those
reasonably likely to yield foreign intelligence information. n316 The Court did not find
this problematic. Because the collection of the information centered on non-U.S.
persons located outside the country, it would be less likely, in the aggregate, "to result in
the acquisition of nonpublic information regarding nonconsenting United States
persons." n317 [*198] As a practical matter, what this rule change means is that
U.S. person information that is incidentally collected via Section 702 can
now be mined using U.S. person information as part of the queries. This
circumvents Congress's requirements in Sections 703 and 704 that prior to
U.S. person information being obtained (and therefore prior to it being analyzed),
the government be required to appear before a court to justify placing a
U.S. person under surveillance.
Section 702 authorizes a broad bulk collection of data –
inevitably includes collection from U.S. persons on a large scale
Donohue, 15 - Professor of Law, Georgetown University Law Center (Laura,
“SECTION 702 AND THE COLLECTION OF INTERNATIONAL TELEPHONE AND
INTERNET CONTENT” 38 Harv. J.L. & Pub. Pol'y 117, Winter, lexis)
II. PROGRAMMATIC COLLECTION n143 Almost immediately after passage of the FAA,
members of Congress, scholars, and others began criticizing Section 702 because [*154]
of the potential for the government to use the authorities to engage in programmatic
surveillance. n144 In 2009 prominent national security law Professor William Banks
explained, "the FAA targets do not have to be suspected of being an agent of a
foreign power or, for that matter, they do not have to be suspected of
terrorism or any national security offense, so long as the collection of
foreign intelligence is a significant purpose of the surveillance." n145
Surveillance could be directed at a person, organization, e-mail address, or
even "an entire ISP or area code." n146 He noted, "the surveillance permitted
under the FAA does not require that the Government identify a particular known facility
where the intercepted communications occur." n147 These provisions represented a sea
change from how FISA had previously worked (albeit introducing, for the first time,
statutory restrictions in an area previously governed by Executive Order). U.S.
persons' communications now could be incidentally collected under the
statute, on a large scale, without many of the protections in traditional
FISA. n148 Banks presciently pointed out the most likely way in which the new
authorities would be used: Although details of the implementation of the program . . .
are not known, a best guess is the Government uses a broad vacuum cleanerlike first stage of collection, focusing on transactional data, where wholesale
interception occurs following the development and implementation of filtering criteria.
Then the NSA engages in a more particularized collection of content after analyzing
mined data . . . [A]ccidental or incidental acquisition of U.S. persons inside the United
States [will] surely occur[], especially in light of the difficulty of ascertaining a target's
location. n149 For Professor Banks, part of the problem was that the nature of
international information flows meant that it would be impossible [*155] to
tell if an individual is located overseas or within domestic bounds. n150
The NSA circumvents Section 702 by adopting a presumption
that targets are non-U.S. persons and not determining whether
they are located domestically
Donohue, 15 - Professor of Law, Georgetown University Law Center (Laura,
“SECTION 702 AND THE COLLECTION OF INTERNATIONAL TELEPHONE AND
INTERNET CONTENT” 38 Harv. J.L. & Pub. Pol'y 117, Winter, lexis)
[*158] A. Targeting As aforementioned, Section 702 places four limitations on
acquisition, each of which is meant to restrict the amount of information that can be
obtained by the government. n166 The NSA has sidestepped these statutory
restrictions in three important ways: first, it has adopted procedures that
allow analysts to acquire information "about" selectors (that is,
communications modes used by targets) or targets, and not merely
communications to or from targets (or selectors employed by targets), or
information held by targets themselves. Second, it has created a presumption of
non-U.S. person status: That is, if an individual is not known to be a U.S.
person (and thus exempted from Section 702 and treated either under Sections
703 and 704 or under traditional FISA, depending on the location), then the NSA
assumes that the individual is a non-U.S. person. Third, the NSA has failed
to adopt standards that would require it to ascertain whether a target is
located within domestic bounds. Instead, the agency, having looked at the
available evidence, absent evidence to the contrary, assumes that the target is
located outside the United States. These interpretations work together to
undermine Congress's addition of Sections 703 and 704, even as they open
the door to more extensive collection of domestic communications. In 2008
Congress anticipated that U.S. person information would inadvertently be collected
under Section 702. This is in part why it included minimization procedures, as well as
limits on what could be collected. Most Members, however, do not appear to have
contemplated broad, programmatic collection that would undermine protections
introduced in Sections 702 and 703. n167 Those who did articulate this possibility voted
against the bill. [*159] Even if Congress did not initially appreciate the potential for
programmatic collection, however, certainly by 2012 the intelligence community had
made enough information available to Congress for Members to make an informed
decision. This does not mean that all Members were fully informed. But to the extent
that Members selected not to access the material or to take a public stand on the matter,
particularly in light of the legislature's reading of its authorities with regard to
classification, fault lies with Congress. The Foreign Intelligence Surveillance Court failed
to step into the gap. In 2011, FISC realized the implications of the NSA's interpretation
of to, from or about (TFA) collection. However, in light of the seriousness of the NSA's
aim (protecting national security), and the limitations imposed by the types of
technologies being used, the Court read the statute in a manner that found the targeting
procedures to be consistent with the statute. To the extent that NSA's TFA and
assumptions regarding the target's foreignness undermine the law as it is
written, the legislature failed to perform effective oversight. Congress
similarly neglected to uphold the limit placed on the intelligence
community to not knowingly collect domestic conversations. Instead, it
relied on FISC to do so--a task that the Court failed to do. In a classified
environment, when so much information is cloaked from public view, it becomes even
more important for the government to ensure that the authorities as they are publicly
presented are consistent with the manner in which they are being exercised.
PRISM allows the NSA to access the records of US domestic
telecomm companies – also it eliminates a warrant requirement
if people are ‘reasonably believed’ to be outside the USA
Greenwald, 13 – Glenn Greenwald is a fomer columnist on civil liberties and US
national security issues for the Guardian. An ex-constitutional lawyer, he was until 2012
a contributing writer at Salon. (Glenn, “NSA Prism program taps in to user data of
Apple, Google and others” The Guardian, 6/7,
http://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data
The National Security Agency has obtained direct access to the systems of
Google, Facebook, Apple and other US internet giants, according to a top secret
document obtained by the Guardian. The NSA access is part of a previously
undisclosed program called Prism, which allows officials to collect material
including search history, the content of emails, file transfers and live chats,
the document says. The Guardian has verified the authenticity of the document, a 41slide PowerPoint presentation – classified as top secret with no distribution to foreign
allies – which was apparently used to train intelligence operatives on the capabilities of
the program. The document claims "collection directly from the servers" of major US
service providers. Although the presentation claims the program is run with the
assistance of the companies, all those who responded to a Guardian request for
comment on Thursday denied knowledge of any such program. In a statement, Google
said: "Google cares deeply about the security of our users' data. We disclose user data to
government in accordance with the law, and we review all such requests carefully. From
time to time, people allege that we have created a government 'back door' into our
systems, but Google does not have a back door for the government to access private user
data." Several senior tech executives insisted that they had no knowledge of Prism or of
any similar scheme. They said they would never have been involved in such a program.
"If they are doing this, they are doing it without our knowledge," one said. An Apple
spokesman said it had "never heard" of Prism. The NSA access was enabled by
changes to US surveillance law introduced under President Bush and
renewed under Obama in December 2012. The program facilitates extensive,
in-depth surveillance on live communications and stored information. The
law allows for the targeting of any customers of participating firms who live
outside the US, or those Americans whose communications include people
outside the US. It also opens the possibility of communications made
entirely within the US being collected without warrants. Disclosure of the
Prism program follows a leak to the Guardian on Wednesday of a top-secret court order
compelling telecoms provider Verizon to turn over the telephone records of millions of
US customers. The participation of the internet companies in Prism will add to the
debate, ignited by the Verizon revelation, about the scale of surveillance by the
intelligence services. Unlike the collection of those call records, this surveillance can
include the content of communications and not just the metadata. Some of the world's
largest internet brands are claimed to be part of the information-sharing program since
its introduction in 2007. Microsoft – which is currently running an advertising
campaign with the slogan "Your privacy is our priority" – was the first, with collection
beginning in December 2007. It was followed by Yahoo in 2008; Google, Facebook and
PalTalk in 2009; YouTube in 2010; Skype and AOL in 2011; and finally Apple, which
joined the program in 2012. The program is continuing to expand, with other providers
due to come online. Collectively, the companies cover the vast majority of online email,
search, video and communications networks. The document is recent, dating to April
2013. Such a leak is extremely rare in the history of the NSA, which prides itself on
maintaining a high level of secrecy. The Prism program allows the NSA, the
world's largest surveillance organisation, to obtain targeted communications
without having to request them from the service providers and without having
to obtain individual court orders. With this program, the NSA is able to reach
directly into the servers of the participating companies and obtain both
stored communications as well as perform real-time collection on targeted
users. The presentation claims Prism was introduced to overcome what the
NSA regarded as shortcomings of Fisa warrants in tracking suspected
foreign terrorists. It noted that the US has a "home-field advantage" due to housing
much of the internet's architecture. But the presentation claimed "Fisa constraints
restricted our home-field advantage" because Fisa required individual warrants and
confirmations that both the sender and receiver of a communication were outside the
US. "Fisa was broken because it provided privacy protections to people who were not
entitled to them," the presentation claimed. "It took a Fisa court order to collect on
foreigners overseas who were communicating with other foreigners overseas simply
because the government was collecting off a wire in the United States. There were too
many email accounts to be practical to seek Fisas for all." The new measures introduced
in the FAA redefines "electronic surveillance" to exclude anyone "reasonably believed"
to be outside the USA – a technical change which reduces the bar to initiating
surveillance. The act also gives the director of national intelligence and the attorney
general power to permit obtaining intelligence information, and indemnifies internet
companies against any actions arising as a result of co-operating with authorities'
requests. In short, where previously the NSA needed individual
authorisations, and confirmation that all parties were outside the USA, they
now need only reasonable suspicion that one of the parties was outside the
country at the time of the records were collected by the NSA. The document
also shows the FBI acts as an intermediary between other agencies and the tech
companies, and stresses its reliance on the participation of US internet firms, claiming
"access is 100% dependent on ISP provisioning". In the document, the NSA hails the
Prism program as "one of the most valuable, unique and productive accesses for NSA".
It boasts of what it calls "strong growth" in its use of the Prism program to obtain
communications. The document highlights the number of obtained communications
increased in 2012 by 248% for Skype – leading the notes to remark there was
"exponential growth in Skype reporting; looks like the word is getting out about our
capability against Skype". There was also a 131% increase in requests for Facebook data,
and 63% for Google. The NSA document indicates that it is planning to add Dropbox as
a PRISM provider. The agency also seeks, in its words, to "expand collection services
from existing providers". The revelations echo fears raised on the Senate floor last year
during the expedited debate on the renewal of the FAA powers which underpin the
PRISM program, which occurred just days before the act expired. Senator Christopher
Coons of Delaware specifically warned that the secrecy surrounding the various
surveillance programs meant there was no way to know if safeguards within the act were
working. "The problem is: we here in the Senate and the citizens we represent don't
know how well any of these safeguards actually work," he said. "The law doesn't forbid
purely domestic information from being collected. We know that at least one Fisa court
has ruled that the surveillance program violated the law. Why? Those who know can't
say and average Americans can't know." Other senators also raised concerns. Senator
Ron Wyden of Oregon attempted, without success, to find out any information on how
many phone calls or emails had been intercepted under the program. When the law
was enacted, defenders of the FAA argued that a significant check on abuse
would be the NSA's inability to obtain electronic communications without
the consent of the telecom and internet companies that control the data.
But the Prism program renders that consent unnecessary, as it allows the
agency to directly and unilaterally seize the communications off the
companies' servers.
Upstream intercepts foreign data only as it enters domestic
internet connections
Gellman, 14 – staff writer for the Washington Post; won 3 Pullitzer Prizes (Barton,
Washington Post, “In NSA-intercepted data, those not targeted far outnumber the
foreigners who are” 7/5, http://www.washingtonpost.com/world/national-security/innsa-intercepted-data-those-not-targeted-far-outnumber-the-foreigners-whoare/2014/07/05/8139adf8-045a-11e4-8572-4b1b969b6322_story.html
Taken together, the files offer an unprecedented vantage point on the changes wrought
by Section 702 of the FISA amendments, which enabled the NSA to make freer
use of methods that for 30 years had required probable cause and a warrant
from a judge. One program, code-named PRISM, extracts content stored in user
accounts at Yahoo, Microsoft, Facebook, Google and five other leading Internet
companies. Another, known inside the NSA as Upstream, intercepts data on the
move as it crosses the U.S. junctions of global voice and data networks. No
government oversight body, including the Justice Department, the Foreign Intelligence
Surveillance Court, intelligence committees in Congress or the president’s Privacy and
Civil Liberties Oversight Board, has delved into a comparably large sample of what the
NSA actually collects — not only from its targets but also from people who may cross a
target’s path. Among the latter are medical records sent from one family member to
another, résumés from job hunters and academic transcripts of schoolchildren. In one
photo, a young girl in religious dress beams at a camera outside a mosque. Scores of
pictures show infants and toddlers in bathtubs, on swings, sprawled on their backs and
kissed by their mothers. In some photos, men show off their physiques. In others,
women model lingerie, leaning suggestively into a webcam or striking risque poses in
shorts and bikini tops. “None of the hits that were received were relevant,” two Navy
cryptologic technicians write in one of many summaries of nonproductive surveillance.
“No additional information,” writes a civilian analyst. Another makes fun of a suspected
kidnapper, newly arrived in Syria before the current civil war, who begs for employment
as a janitor and makes wide-eyed observations about the state of undress displayed by
women on local beaches. By law, the NSA may “target” only foreign nationals
located overseas unless it obtains a warrant based on probable cause from a
special surveillance court. For collection under PRISM and Upstream rules,
analysts must state a reasonable belief that the target has information of
value about a foreign government, a terrorist organization or the spread of
nonconventional weapons. Most of the people caught up in those programs
are not the targets and would not lawfully qualify as such. “Incidental
collection” of third-party communications is inevitable in many forms of surveillance,
but in other contexts the U.S. government works harder to limit and discard irrelevant
data. In criminal wiretaps, for example, the FBI is supposed to stop listening to a call if a
suspect’s wife or child is using the phone. There are many ways to be swept up
incidentally in surveillance aimed at a valid foreign target. Some of those in the
Snowden archive were monitored because they interacted directly with a target, but
others had more-tenuous links. If a target entered an online chat room, the NSA
collected the words and identities of every person who posted there, regardless of
subject, as well as every person who simply “lurked,” reading passively what other
people wrote. “1 target, 38 others on there,” one analyst wrote. She collected data on
them all. In other cases, the NSA designated as its target the Internet protocol, or IP,
address of a computer server used by hundreds of people. The NSA treats all content
intercepted incidentally from third parties as permissible to retain, store,
search and distribute to its government customers. Raj De, the agency’s general
counsel, has testified that the NSA does not generally attempt to remove irrelevant
personal content, because it is difficult for one analyst to know what might become
relevant to another. The Obama administration declines to discuss the scale of
incidental collection. The NSA, backed by Director of National Intelligence James R.
Clapper Jr., has asserted that it is unable to make any estimate, even in
classified form, of the number of Americans swept in. It is not obvious why the
NSA could not offer at least a partial count, given that its analysts routinely pick out
“U.S. persons” and mask their identities, in most cases, before distributing intelligence
reports. If Snowden’s sample is representative, the population under scrutiny in
the PRISM and Upstream programs is far larger than the government has
suggested. In a June 26 “transparency report,” the Office of the Director of National
Intelligence disclosed that 89,138 people were targets of last year’s collection under
FISA Section 702. At the 9-to-1 ratio of incidental collection in Snowden’s sample, the
office’s figure would correspond to nearly 900,000 accounts, targeted or not, under
surveillance.
Extra Cards
A US persons standard avoids the problems with geographic
limits on the internet
Donohue, 15 - Professor of Law, Georgetown University Law Center (Laura,
“SECTION 702 AND THE COLLECTION OF INTERNATIONAL TELEPHONE AND
INTERNET CONTENT” 38 Harv. J.L. & Pub. Pol'y 117, Winter, lexis)
To the extent that the interception of U.S. persons' communications
constitutes a search or seizure within the meaning of the Fourth
Amendment, it would appear that, at least at the front [*230] end, U.S.
persons are entitled to protections. n456 The inspection and collection of
content falls within the meaning of a search and seizure under the Fourth
Amendment.
Just as virtual entry into the United States should not matter for purposes of setting a
threshold for application of the Fourth Amendment to aliens, use of global
communications should not thereby divest U.S. persons of their
constitutional protections. This approach is consistent with the geographic focus of
the Courts in regard to the Fourth Amendment. It does not hinge constitutional
protections on movement along global communications networks--itself an
untenable proposition in light of how information flows over the Internet.
If the courts, for instance, were to construct a rule that said that U.S. persons
sending information outside the United States lose the protections of the
Fourth Amendment in the privacy afforded those communications, it would be
difficult to police. This rule assumes that individuals have control over
whether their communications leave domestic bounds. They do not. The
Internet is constructed to find the most efficient route between two ISP
addresses. This means that even domestic communications may be routed
internationally. Individuals have no control over how their messages are
conveyed. At the back end, the government would have to be able to ascertain which
messages originated within the United States and then left U.S. bounds. But the NSA
claims that it does not have the appropriate technologies to make this call.
As a result, the effect of this rule would essentially be to assume that every time a U.S.
person communicates, she loses constitutional protections in the content of those
communications. This would eviscerate the meaning of the Fourth Amendment. It
would assume that U.S. persons have no reasonable expectation of privacy in their
communications, regardless of whether they flow across international borders.
The Supreme Court can avoid this conclusion by underscoring the status of the
individual as Rehnquist articulated for the majority in Verdugo-Urquidez:
emphasizing membership in the political community. Where established,
the protection of the Fourth Amendment applies.
The NSA intercepts upstream data by tapping directly into US
service providers
Donohue, 15 - Professor of Law, Georgetown University Law Center (Laura,
“SECTION 702 AND THE COLLECTION OF INTERNATIONAL TELEPHONE AND
INTERNET CONTENT” 38 Harv. J.L. & Pub. Pol'y 117, Winter, lexis)
A follow-up article two days later printed another slide depicting both PRISM
and "upstream" collection of communications on fiber cables and
infrastructure ("[c]ollection directly from the servers of . . . U.S. Service
Providers.") n8 Upstream interception allowed the NSA to acquire Internet
communications "as they [*121] transit the 'internet backbone' facilities." n9
The NSA could collect all traffic crossing Internet cables--not just
information targeted at specific Internet Protocol (IP) addresses or telephone
number. The potential yield was substantial: in the first six months of 2011, the NSA
acquired more than 13.25 million Internet transactions through its upstream collection.
n10 The slide urged analysts to use both PRISM and upstream collection to obtain
information. n11
Within days of the releases, the intelligence community acknowledged the existence of
the programs. n12 In August 2013 the Director of National Intelligence, James Clapper,
offered further confirmation, noting that PRISM had been in operation since Congress
had passed the 2008 FISA Amendments Act. n13 He declassified eight documents, n14
and by the end of the month, he had announced that the intelligence community would
release the total [*122] number of Section 702 orders issued, and targets thereby
affected, on an annual basis. n15
NSA interpretation of the FAA means in practice PRISM targets
domestic communications
Donohue, 15 - Professor of Law, Georgetown University Law Center (Laura,
“SECTION 702 AND THE COLLECTION OF INTERNATIONAL TELEPHONE AND
INTERNET CONTENT” 38 Harv. J.L. & Pub. Pol'y 117, Winter, lexis) FAA = 2008
FISA Amendments Act
The Article next turns to statutory issues related to targeting, post-targeting analysis,
and the retention and dissemination of information. It argues that the NSA has
sidestepped FAA restrictions by adopting procedures that allow analysts to
acquire information not just to or from, but also "about" targets. In its
foreignness determination the agency assumes, absent evidence to the
contrary, that the target is a non-U.S. person located outside domestic
bounds. And weak standards mark the foreign intelligence purpose
determination. Together, these elements allow for the broad collection of
U.S. persons' international communications, even as they open the door to
the interception of domestic communications. In regard to post-targeting
analysis, the Article draws attention to the intelligence community's use of U.S.
person information to query data obtained under Section 702, effectively
bypassing protections Congress introduced to prevent reverse targeting. The
Article further notes in relation to retention and dissemination that increasing
consumer and industrial reliance on cryptography means that the NSA's retention of
encrypted data may soon become the exception that swallows the rule.
In its constitutional analysis, the Article finds certain practices instituted under Section
702 to fall outside acceptable Fourth Amendment bounds. Although lower courts had
begun to recognize a domestic foreign intelligence exception to the warrant clause, in
1978 Congress introduced FISA to be the sole means via which domestic foreign
intelligence electronic intercepts could be undertaken. Consistent with separation of
powers doctrine, this shift carried constitutional meaning. Internationally, practice and
precedent prior to the FAA turned on a foreign intelligence exception. But in 2008
Congress altered the status quo, introducing individualized judicial review
into the process. Like FISA, the FAA carried constitutional import.
[*124] If that were the end of the story, one could argue that the incidental collection of
U.S. persons' information, as well as the interception of domestic conversations ought to
be regarded in Justice Jackson's third category under Youngstown Sheet & Tube Co. v.
Sawyer. n18 Renewal in 2012, however, points in the opposite direction. The NSA's
actions, for purposes of the warrant clause, appear to be constitutionally
sufficient insofar as foreign intelligence gathering to or from non-U.S.
persons is concerned. The tipping point comes with regard to criminal
prosecution. Absent a foreign intelligence purpose, there is no exception to
the warrant requirement for the query of U.S. persons' international or
domestic communications.
Although a warrant is not required for foreign intelligence collection overseas, the
interception of communications under Section 702 must still comport with the
reasonableness requirements of the Fourth Amendment. A totality of the circumstances
test, in which the significant governmental interest in national security is weighed
against the potential intrusion into U.S. persons' privacy, applies. The incidental
collection of large quantities of U.S. persons' international
communications, the scanning of content for information "about" non-U.S.
person targets, and the interception of non-relevant and entirely domestic
communications in multi-communication transactions, as well as the query
of data using U.S. person identifiers, fall outside the reasonableness
component of the Fourth Amendment.
The Article concludes by calling for renewed efforts to draw a line between
foreign intelligence gathering and criminal law and to create higher
protections for U.S. persons, to ensure that the United States can continue
to collect critical information, while remaining consistent with the right to
privacy embedded in the Fourth Amendment.
NSA overreach means it inevitably monitors domestic internet
communications – rerouting, MCTs, and ‘about’
communications
Donohue, 15 - Professor of Law, Georgetown University Law Center (Laura,
“SECTION 702 AND THE COLLECTION OF INTERNATIONAL TELEPHONE AND
INTERNET CONTENT” 38 Harv. J.L. & Pub. Pol'y 117, Winter, lexis)
Three points related to the volume and intrusiveness of the resulting surveillance
deserve notice. First, to obtain "about" communications, because of how the
Internet is constructed, the NSA must monitor large amounts of data. n180
That is, if the NSA may [*163] collect not just e-mail to or from the target's email account (badguy@ISP.com), but, in addition, other communications
happening to mention badguy@ISP.com that pass through the collection
point, then the NSA is monitoring a significant amount of traffic. And the
agency is not just considering envelope information (for example, messages in
which the selector is sending, receiving, or copied on the communication) but the
actual content of messages. n181
Second, wholly domestic conversations may become swept up in the
surveillance simply by nature of how the Internet is constructed. Everything
one does online involves packets of information. Every Web site, every email, every transfer of documents takes the information involved and
divides it up into small bundles. Limited in size, these packets contain
information about the sender's IP address, the intended receiver's IP
address, something that indicates how many packets the communication
has been divvied up into, and what number in the chain is represented by
the packet in question. n182
Packet switched networks ship this information to a common destination via the most
expedient route--one that may, or may not, include the other packets of information
contained in the message. If a roadblock or problem arises in the network, the packets
can then be re-routed, to reach their final destination. Domestic messages may thus
be routed through international servers, if that is the most efficient route to
the final destination.
What this means is that even if the NSA applies an IP filter to eliminate
communications that appear to be within the United States, it may
nevertheless monitor domestic conversations by nature of them being
routed through foreign servers. In this manner, a student in Chicago may
send an e-mail to a student in Boston [*164] that gets routed through a
server in Canada. Through no intent or design of the individual in Chicago, the
message becomes international and thus subject to NSA surveillance.
Third, further collection of domestic conversations takes place through the
NSA's intercept of what are called multi-communication transactions, or
MCTs. It is important to distinguish here between a transaction and a communication.
Some transactions have only single communications associated with them. These are
referred to as SCTs. Other transactions contain multiple communications. If even one of
the communications in an MCT falls within the NSA's surveillance, all of the
communications bundled into the MCT are collected.
The consequence is of significant import. FISC estimated in 2011 that somewhere
between 300,000 and 400,000 MCTs were being collected annually on the
basis of "about" communication--where the "active user" was not the target.
So hundreds of thousands of communications were being collected that did
not include the target as either the sender or the recipient of the
communication. n183
PRISM allows reverse-targeting: targeting someone outside the
United States to collect information about someone in the United
States
Donohue, 15 - Professor of Law, Georgetown University Law Center (Laura,
“SECTION 702 AND THE COLLECTION OF INTERNATIONAL TELEPHONE AND
INTERNET CONTENT” 38 Harv. J.L. & Pub. Pol'y 117, Winter, lexis)
B. Post-Targeting Analysis
Section 702 makes it illegal to target someone outside the United States,
where the purpose of the acquisition is to obtain information about a
person known to be within domestic bounds. This practice, known as
"reverse targeting," was central to Congressional debates. n308 Representative
Langevin explained that the insertion of FISC would "ensure that the government's
efforts are not aimed at targeting Americans, the so-called reverse targeting that we're
all concerned about; and that if an American's communications is [sic] inadvertently
intercepted, it is dealt with in a manner that guarantees legal protections." n309
Despite Congress' concern about reverse targeting, the NSA instituted and
the FISC approved a rule change in October 2011 to make it possible to query
the content of communications obtained under Section 702 using U.S.
person names and identifiers for information obtained via PRISM and
upstream telephony collection. n310 [*196] The relevant definition in the 2011
minimization procedures is largely consistent with its 2009 predecessor:
Identification of a United States person means the name, unique title, address, or other
personal identifier of a United States person in the context of activities conducted by
that person or activities conducted by others that are related to that person. A reference
to a product by brand name, or manufacturer's name or the use of a name in a
descriptive sense, e.g., "Monroe Doctrine," is not an identification of a United States
person. n311
The NSA may query data obtained under Section 702 by using the names,
titles, or addresses of U.S. persons, or any other information that may be
related to the individual and his or her activities. If the intelligence community
would like to query the data based on, for instance, membership in the Council on
Foreign Relations--on the grounds that such queries are likely to yield foreign
intelligence information--it may now do so.
In March 2014, the Director of National Intelligence, James Clapper, confirmed in a
letter to Senator Ron Wyden that the [*197] NSA had queried Section 702 data
"using U.S. person identifiers." n312 The following month, the NSA's Privacy and
Civil Liberties Officer reiterated Clapper's statement. n313 Pressed during a June 2014
hearing for the number of queries using U.S. person identifiers, Clapper responded by
noting that in 2013, the NSA approved 198 U.S. person identifiers for querying the
content of Section 702 communications, even as it queried Section-702-acquired
metadata approximately 9,500 times. n314
FISC has upheld the reading of the statute supporting use of U.S. person identifiers.
n315 In its October 2011 opinion, the Court explained:
The procedures previously approved by the Court effectively impose a wholesale bar on
queries using United States-Person identifiers. The government has broadened Section
3(b)(5) to allow NSA to query the vast majority of its Section 702 collection using United
States-Person identifiers, subject to approval pursuant to internal NSA procedures and
oversight by the Department of Justice. Like all other NSA queries of the Section 702
collection, queries using United States-person identifiers would be limited to those
reasonably likely to yield foreign intelligence information. n316
The Court did not find this problematic. Because the collection of the information
centered on non-U.S. persons located outside the country, it would be less likely, in the
aggregate, "to result in the acquisition of nonpublic information regarding
nonconsenting United States persons." n317
[*198] As a practical matter, what this rule change means is that U.S. person
information that is incidentally collected via Section 702 can now be mined
using U.S. person information as part of the queries. This circumvents
Congress's requirements in Sections 703 and 704 that prior to U.S. person
information being obtained (and therefore prior to it being analyzed), the
government be required to appear before a court to justify placing a U.S.
person under surveillance.
Section 702 authorizes a broad bulk collection of data –
inevitably includes collection from U.S. persons on a large scale
Donohue, 15 - Professor of Law, Georgetown University Law Center (Laura,
“SECTION 702 AND THE COLLECTION OF INTERNATIONAL TELEPHONE AND
INTERNET CONTENT” 38 Harv. J.L. & Pub. Pol'y 117, Winter, lexis)
II. PROGRAMMATIC COLLECTION n143
Almost immediately after passage of the FAA, members of Congress, scholars, and
others began criticizing Section 702 because [*154] of the potential for the government
to use the authorities to engage in programmatic surveillance. n144
In 2009 prominent national security law Professor William Banks explained, "the FAA
targets do not have to be suspected of being an agent of a foreign power or,
for that matter, they do not have to be suspected of terrorism or any national
security offense, so long as the collection of foreign intelligence is a
significant purpose of the surveillance." n145 Surveillance could be directed
at a person, organization, e-mail address, or even "an entire ISP or area
code." n146 He noted, "the surveillance permitted under the FAA does not require that
the Government identify a particular known facility where the intercepted
communications occur." n147 These provisions represented a sea change from how FISA
had previously worked (albeit introducing, for the first time, statutory restrictions in an
area previously governed by Executive Order). U.S. persons' communications now
could be incidentally collected under the statute, on a large scale, without
many of the protections in traditional FISA. n148
Banks presciently pointed out the most likely way in which the new authorities would be
used:
Although details of the implementation of the program . . . are not known, a best guess is
the Government uses a broad vacuum cleaner-like first stage of collection,
focusing on transactional data, where wholesale interception occurs following the
development and implementation of filtering criteria. Then the NSA engages in a more
particularized collection of content after analyzing mined data . . . [A]ccidental or
incidental acquisition of U.S. persons inside the United States [will] surely occur[],
especially in light of the difficulty of ascertaining a target's location. n149
For Professor Banks, part of the problem was that the nature of international
information flows meant that it would be impossible [*155] to tell if an
individual is located overseas or within domestic bounds. n150
The NSA circumvents Section 702 by adopting a presumption
that targets are non-U.S. persons and not determining whether
they are located domestically
Donohue, 15 - Professor of Law, Georgetown University Law Center (Laura,
“SECTION 702 AND THE COLLECTION OF INTERNATIONAL TELEPHONE AND
INTERNET CONTENT” 38 Harv. J.L. & Pub. Pol'y 117, Winter, lexis)
[*158] A. Targeting
As aforementioned, Section 702 places four limitations on acquisition, each of
which is meant to restrict the amount of information that can be obtained by the
government. n166 The NSA has sidestepped these statutory restrictions in
three important ways: first, it has adopted procedures that allow analysts to
acquire information "about" selectors (that is, communications modes used by
targets) or targets, and not merely communications to or from targets (or
selectors employed by targets), or information held by targets themselves. Second, it
has created a presumption of non-U.S. person status: That is, if an
individual is not known to be a U.S. person (and thus exempted from
Section 702 and treated either under Sections 703 and 704 or under traditional FISA,
depending on the location), then the NSA assumes that the individual is a nonU.S. person. Third, the NSA has failed to adopt standards that would
require it to ascertain whether a target is located within domestic bounds.
Instead, the agency, having looked at the available evidence, absent evidence to the
contrary, assumes that the target is located outside the United States. These
interpretations work together to undermine Congress's addition of Sections
703 and 704, even as they open the door to more extensive collection of
domestic communications.
In 2008 Congress anticipated that U.S. person information would inadvertently be
collected under Section 702. This is in part why it included minimization procedures, as
well as limits on what could be collected. Most Members, however, do not appear to
have contemplated broad, programmatic collection that would undermine protections
introduced in Sections 702 and 703. n167 Those who did articulate this possibility voted
against the bill.
[*159] Even if Congress did not initially appreciate the potential for programmatic
collection, however, certainly by 2012 the intelligence community had made enough
information available to Congress for Members to make an informed decision. This does
not mean that all Members were fully informed. But to the extent that Members selected
not to access the material or to take a public stand on the matter, particularly in light of
the legislature's reading of its authorities with regard to classification, fault lies with
Congress.
The Foreign Intelligence Surveillance Court failed to step into the gap. In 2011, FISC
realized the implications of the NSA's interpretation of to, from or about (TFA)
collection. However, in light of the seriousness of the NSA's aim (protecting national
security), and the limitations imposed by the types of technologies being used, the Court
read the statute in a manner that found the targeting procedures to be consistent with
the statute.
To the extent that NSA's TFA and assumptions regarding the target's
foreignness undermine the law as it is written, the legislature failed to
perform effective oversight. Congress similarly neglected to uphold the
limit placed on the intelligence community to not knowingly collect
domestic conversations. Instead, it relied on FISC to do so--a task that the
Court failed to do. In a classified environment, when so much information is cloaked
from public view, it becomes even more important for the government to ensure that the
authorities as they are publicly presented are consistent with the manner in which they
are being exercised.
PRISM allows the NSA to access the records of US domestic
telecomm companies – also it eliminates a warrant requirement
if people are ‘reasonably believed’ to be outside the USA
Greenwald, 13 – Glenn Greenwald is a fomer columnist on civil liberties and US
national security issues for the Guardian. An ex-constitutional lawyer, he was until 2012
a contributing writer at Salon. (Glenn, “NSA Prism program taps in to user data of
Apple, Google and others” The Guardian, 6/7,
http://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data
The National Security Agency has obtained direct access to the systems of
Google, Facebook, Apple and other US internet giants, according to a top secret
document obtained by the Guardian.
The NSA access is part of a previously undisclosed program called Prism,
which allows officials to collect material including search history, the
content of emails, file transfers and live chats, the document says.
The Guardian has verified the authenticity of the document, a 41-slide PowerPoint
presentation – classified as top secret with no distribution to foreign allies – which was
apparently used to train intelligence operatives on the capabilities of the program. The
document claims "collection directly from the servers" of major US service providers.
Although the presentation claims the program is run with the assistance of the
companies, all those who responded to a Guardian request for comment on Thursday
denied knowledge of any such program.
In a statement, Google said: "Google cares deeply about the security of our users' data.
We disclose user data to government in accordance with the law, and we review all such
requests carefully. From time to time, people allege that we have created a government
'back door' into our systems, but Google does not have a back door for the government
to access private user data."
Several senior tech executives insisted that they had no knowledge of Prism or of any
similar scheme. They said they would never have been involved in such a program. "If
they are doing this, they are doing it without our knowledge," one said.
An Apple spokesman said it had "never heard" of Prism.
The NSA access was enabled by changes to US surveillance law introduced
under President Bush and renewed under Obama in December 2012.
The program facilitates extensive, in-depth surveillance on live
communications and stored information. The law allows for the targeting of
any customers of participating firms who live outside the US, or those
Americans whose communications include people outside the US.
It also opens the possibility of communications made entirely within the US
being collected without warrants.
Disclosure of the Prism program follows a leak to the Guardian on Wednesday of a topsecret court order compelling telecoms provider Verizon to turn over the telephone
records of millions of US customers.
The participation of the internet companies in Prism will add to the debate, ignited by
the Verizon revelation, about the scale of surveillance by the intelligence services. Unlike
the collection of those call records, this surveillance can include the content of
communications and not just the metadata.
Some of the world's largest internet brands are claimed to be part of the informationsharing program since its introduction in 2007. Microsoft – which is currently running
an advertising campaign with the slogan "Your privacy is our priority" – was the first,
with collection beginning in December 2007.
It was followed by Yahoo in 2008; Google, Facebook and PalTalk in 2009; YouTube in
2010; Skype and AOL in 2011; and finally Apple, which joined the program in 2012. The
program is continuing to expand, with other providers due to come online.
Collectively, the companies cover the vast majority of online email, search, video and
communications networks.
The document is recent, dating to April 2013. Such a leak is extremely rare in the history
of the NSA, which prides itself on maintaining a high level of secrecy.
The Prism program allows the NSA, the world's largest surveillance organisation,
to obtain targeted communications without having to request them from
the service providers and without having to obtain individual court orders.
With this program, the NSA is able to reach directly into the servers of the
participating companies and obtain both stored communications as well as
perform real-time collection on targeted users.
The presentation claims Prism was introduced to overcome what the NSA
regarded as shortcomings of Fisa warrants in tracking suspected foreign
terrorists. It noted that the US has a "home-field advantage" due to housing much of
the internet's architecture. But the presentation claimed "Fisa constraints restricted our
home-field advantage" because Fisa required individual warrants and confirmations
that both the sender and receiver of a communication were outside the US.
"Fisa was broken because it provided privacy protections to people who were not
entitled to them," the presentation claimed. "It took a Fisa court order to collect on
foreigners overseas who were communicating with other foreigners overseas simply
because the government was collecting off a wire in the United States. There were too
many email accounts to be practical to seek Fisas for all."
The new measures introduced in the FAA redefines "electronic surveillance" to exclude
anyone "reasonably believed" to be outside the USA – a technical change which reduces
the bar to initiating surveillance.
The act also gives the director of national intelligence and the attorney general power to
permit obtaining intelligence information, and indemnifies internet companies against
any actions arising as a result of co-operating with authorities' requests.
In short, where previously the NSA needed individual authorisations, and
confirmation that all parties were outside the USA, they now need only
reasonable suspicion that one of the parties was outside the country at the
time of the records were collected by the NSA.
The document also shows the FBI acts as an intermediary between other agencies and
the tech companies, and stresses its reliance on the participation of US internet firms,
claiming "access is 100% dependent on ISP provisioning".
In the document, the NSA hails the Prism program as "one of the most valuable, unique
and productive accesses for NSA".
It boasts of what it calls "strong growth" in its use of the Prism program to obtain
communications. The document highlights the number of obtained communications
increased in 2012 by 248% for Skype – leading the notes to remark there was
"exponential growth in Skype reporting; looks like the word is getting out about our
capability against Skype". There was also a 131% increase in requests for Facebook data,
and 63% for Google.
The NSA document indicates that it is planning to add Dropbox as a PRISM provider.
The agency also seeks, in its words, to "expand collection services from existing
providers".
The revelations echo fears raised on the Senate floor last year during the expedited
debate on the renewal of the FAA powers which underpin the PRISM program, which
occurred just days before the act expired.
Senator Christopher Coons of Delaware specifically warned that the secrecy surrounding
the various surveillance programs meant there was no way to know if safeguards within
the act were working.
"The problem is: we here in the Senate and the citizens we represent don't know how
well any of these safeguards actually work," he said.
"The law doesn't forbid purely domestic information from being collected. We know that
at least one Fisa court has ruled that the surveillance program violated the law. Why?
Those who know can't say and average Americans can't know."
Other senators also raised concerns. Senator Ron Wyden of Oregon attempted, without
success, to find out any information on how many phone calls or emails had been
intercepted under the program.
When the law was enacted, defenders of the FAA argued that a significant
check on abuse would be the NSA's inability to obtain electronic
communications without the consent of the telecom and internet
companies that control the data. But the Prism program renders that
consent unnecessary, as it allows the agency to directly and unilaterally
seize the communications off the companies' servers.
Upstream intercepts foreign data only as it enters domestic
internet connections
Gellman, 14 – staff writer for the Washington Post; won 3 Pullitzer Prizes (Barton,
Washington Post, “In NSA-intercepted data, those not targeted far outnumber the
foreigners who are” 7/5, http://www.washingtonpost.com/world/national-security/innsa-intercepted-data-those-not-targeted-far-outnumber-the-foreigners-whoare/2014/07/05/8139adf8-045a-11e4-8572-4b1b969b6322_story.html
Taken together, the files offer an unprecedented vantage point on the changes wrought
by Section 702 of the FISA amendments, which enabled the NSA to make freer
use of methods that for 30 years had required probable cause and a warrant
from a judge. One program, code-named PRISM, extracts content stored in user
accounts at Yahoo, Microsoft, Facebook, Google and five other leading Internet
companies. Another, known inside the NSA as Upstream, intercepts data on the
move as it crosses the U.S. junctions of global voice and data networks.
No government oversight body, including the Justice Department, the Foreign
Intelligence Surveillance Court, intelligence committees in Congress or the president’s
Privacy and Civil Liberties Oversight Board, has delved into a comparably large sample
of what the NSA actually collects — not only from its targets but also from people who
may cross a target’s path.
Among the latter are medical records sent from one family member to another, résumés
from job hunters and academic transcripts of schoolchildren. In one photo, a young girl
in religious dress beams at a camera outside a mosque.
Scores of pictures show infants and toddlers in bathtubs, on swings, sprawled on their
backs and kissed by their mothers. In some photos, men show off their physiques. In
others, women model lingerie, leaning suggestively into a webcam or striking risque
poses in shorts and bikini tops.
“None of the hits that were received were relevant,” two Navy cryptologic technicians
write in one of many summaries of nonproductive surveillance. “No additional
information,” writes a civilian analyst. Another makes fun of a suspected kidnapper,
newly arrived in Syria before the current civil war, who begs for employment as a janitor
and makes wide-eyed observations about the state of undress displayed by women on
local beaches.
By law, the NSA may “target” only foreign nationals located overseas unless
it obtains a warrant based on probable cause from a special surveillance
court. For collection under PRISM and Upstream rules, analysts must state
a reasonable belief that the target has information of value about a foreign
government, a terrorist organization or the spread of nonconventional
weapons.
Most of the people caught up in those programs are not the targets and
would not lawfully qualify as such. “Incidental collection” of third-party
communications is inevitable in many forms of surveillance, but in other contexts the
U.S. government works harder to limit and discard irrelevant data. In criminal wiretaps,
for example, the FBI is supposed to stop listening to a call if a suspect’s wife or child is
using the phone.
There are many ways to be swept up incidentally in surveillance aimed at a valid foreign
target. Some of those in the Snowden archive were monitored because they interacted
directly with a target, but others had more-tenuous links.
If a target entered an online chat room, the NSA collected the words and identities of
every person who posted there, regardless of subject, as well as every person who simply
“lurked,” reading passively what other people wrote.
“1 target, 38 others on there,” one analyst wrote. She collected data on them all.
In other cases, the NSA designated as its target the Internet protocol, or IP, address of a
computer server used by hundreds of people.
The NSA treats all content intercepted incidentally from third parties as
permissible to retain, store, search and distribute to its government
customers. Raj De, the agency’s general counsel, has testified that the NSA does not
generally attempt to remove irrelevant personal content, because it is difficult for one
analyst to know what might become relevant to another.
The Obama administration declines to discuss the scale of incidental collection. The
NSA, backed by Director of National Intelligence James R. Clapper Jr., has asserted
that it is unable to make any estimate, even in classified form, of the
number of Americans swept in. It is not obvious why the NSA could not offer at
least a partial count, given that its analysts routinely pick out “U.S. persons” and mask
their identities, in most cases, before distributing intelligence reports.
If Snowden’s sample is representative, the population under scrutiny in the
PRISM and Upstream programs is far larger than the government has
suggested. In a June 26 “transparency report,” the Office of the Director of National
Intelligence disclosed that 89,138 people were targets of last year’s collection under
FISA Section 702. At the 9-to-1 ratio of incidental collection in Snowden’s sample, the
office’s figure would correspond to nearly 900,000 accounts, targeted or not, under
surveillance.
Ex Post CP
Multi Plank CPs Bad
Interpretation: The neg should not have access to multiplank CPs.
Violation: The Neg proposes a counterplan with three planks.
Standards:
1. Explodes Neg Ground – Get the ability to read any number of planks and kick them
individually (fairness).
2. Depth over breadth – they explode the amount of subjects in the debate – depth
gives us better research skills – we have to find specific evidence and various warrants
(education).
3. Multiple CP’s check – they can run all of their CP’s, they just have to be separate
Voter: Fairness and education.
Reject the team not the argument.
Ex Post DA
Secrecy makes meaningful ex post review impossible
Setty, 15 - Professor of Law and Associate Dean for Faculty Development & Intellectual
Life, Western New England University School of Law (Sudha, “Surveillance, Secrecy,
and the Search for Meaningful Accountability” 51 Stan. J Int'l L. 69, Winter, lexis)
The extent of congressional knowledge regarding the NSA Metadata Program is not fully
known to the public and has been the subject of significant debate. Nonetheless, even
assuming that Congress was sufficiently informed as to the potential reach of the
PATRIOT Act with regard to surveillance n59 and, therefore, that the statutory authority
for the bulk data collection and storage was sound, the ability of Congress to effect
significant and meaningful ex post oversight appears to be severely limited.
Historically, congressional hearings and investigations have been a
powerful tool to rein in executive branch overreaching. n60 However, it
seems that the extreme secrecy surrounding the NSA surveillance programs
undermined the efficacy of these oversight powers, to the point that they
may have been reduced to an ersatz form of accountability. One prominent
example stems from a Senate oversight hearing on March 12, 2013, in which Senator
Ron Wyden specifically asked Director of National Intelligence James Clapper if the
NSA was systematically gathering information on the communications of millions of
Americans. n61 Clapper denied this, yet subsequent revelations confirmed that the
broad scope of the data collection included metadata for telephonic communications, as
well as content data for emails, texts, and other such writings. n62 After public
discussion of the discrepancy in his testimony, Clapper commented that he gave the
"least most untruthful" answer possible under the circumstances. n63 Senator Wyden
expressed disappointment and frustration that even while under oath at an oversight
hearing, Clapper misled the Senate. n64
The ability for congressional oversight is further hampered by a general
lack of access to information about the details of the NSA Metadata
Program n65 and [*82] lack of ability to discuss publicly whatever
knowledge is shared with Congress. n66 In fact, it remains unclear whether
senators, including Dianne Feinstein, Chair of the Senate Intelligence Committee, knew
of the lapses in NSA procedure until after such information was leaked to news sources.
n67 Further revelations indicate that administration statements made to Congress even
after the Snowden disclosures were not entirely accurate. n68 These examples are not
determinative, but taken together, they raise significant doubt to the extent of
accurate information regarding surveillance programs being made
available to congressional oversight committees, and whether the oversight
committees can function as effective accountability measures n69 without
the benefit of illegally leaked information such as the Snowden disclosures.
Ex post fails – hindsight bias and secrecy
Morgan, 8 - Law Clerk to the Honorable Samuel H. Mays, Jr., United States District
Court for the Western District of Tennessee. J.D., 2007, New York University School of
Law (Alexander, “A BROADENED VIEW OF PRIVACY AS A CHECK AGAINST
GOVERNMENT ACCESS TO E-MAIL IN THE UNITED STATES AND THE UNITED
KINGDOM” 40 N.Y.U. J. Int'l L. & Pol. 803, Spring, lexis)
Ex post judicial review is compromised by hindsight bias. n192 Strict
reliance on ex post approaches presupposes that judges charged with
determining the sufficiency of original [*836] search justifications are
capable of ignoring potentially inculpatory evidence since uncovered. As
with the notion of a disinterested Home Secretary, this appears at odds with
human nature. n193
The delay or outright denial of notice to search targets minimizes the
efficacy of judicial review. Without notice, "the majority of interferences with
privacy will be undetected," and most will only learn that they were surveillance targets
if criminal charges follow. n194 By implication, the true extent of surveillance (and
any abuse) remains unknown. n195 Untimely notice also compromises the value of
judicial review because the court will be privy to the fruits of a search already conducted
and thus susceptible to hindsight bias. In the United Kingdom, the Home Secretary
never gives notification, n196 and delayed notice is fast growing in the United States
through the use of "sneak and peek" warrants. n197 Gauging the scope of surveillance in
the United Kingdom is further frustrated by non-responsive Tribunal decisions which
"simply state whether the determination is favourable ... thus, not necessarily revealing
[if] there has been any interception or its details." n198
[*837] Independent monitors such as the Interception of Communications
Commissioner are prone to hindsight bias and also suffer from distinct shortcomings
due to their generalized function. Their general charge allows them to uncover and
address (through recommendations to Parliament) systemic defects more easily, unlike
courts, which are limited to case-by-case review. The converse is that monitors lack
authority to remedy any specific abuses they uncover. n199 Above all, commentators
characterize monitors as helpless because there are too many authorizations to oversee,
such that "not all authorisations are subject to scrutiny; only those selected at random."
n200 In sum, the government's power to withhold notice precludes targets
from seeking judicial review, and the result is that many authorizations are
never held "to any form of independent scrutiny." n201
Ex post is impossible to enforce and amounts to a rubber stamp
Berman, 14 - Visiting Assistant Professor of Law, Brooklyn Law School (Emily
Berman, Regulating Domestic Intelligence Collection, 71 Wash. & Lee L. Rev. 3,
http://scholarlycommons.law.wlu.edu/wlulr/vol71/iss1/5
The suggestion that the FISC approximate the role of traditional judicial review of
agency decision making to impose constraints on discretion will also fail to result in the
preservation of civil liberties. As an initial matter, it is unclear what the extent of the
FISC’s review might be. Traditional judicial review of administrative rules asks whether
an agency’s action is consistent with the Constitution and its statutory mandate or
whether it is arbitrary or capricious.319 But when it comes to most intelligencecollection rules, there is no constitutional or statutory standard against
which a court could measure agency compliance.320 One proposed solution
to this baseline problem is to have the FISC review policy for whether it is
consistent with the intelligence agencies’ own stated objectives.321 Again,
this proposal fails to account for the fact that when the intelligence
community is left to determine the rules of its own conduct, concerns other
than security will get short shrift. By asking intelligence agencies to identify their own
objectives and then subjecting their efforts to meet those objectives to judicial review
would replicate the current situation—where the constraints on agencies are limited to
those that they agree to place on themselves—but with the added legitimating feature of
judicial imprimatur.
Another barrier to enlisting the FISC in intelligencecollection governance is that the
intelligence-collection activities governed by the Guidelines extend beyond the scope of
the FISC’s jurisdiction. The FISC oversees electronic foreign intelligence surveillance
and physical searches of premises connected with foreign powers.322 It has no role in
overseeing purely domestic surveillance of Americans absent probable cause that those
Americans are agents of a foreign power.323 The content of the Guidelines and the
activities they regulate—such as physical surveillance of Americans, infiltration of
religious or political groups, the use of informants, requests for internet history— rarely
fall within the FISC’s jurisdiction. Individuals who wish to challenge FBI activity—if they
can establish standing—do not have access to the FISC.324 Thus, it is unclear what role
the FISC could play in reviewing many activities in which the FBI engages.
The FISC, too, is likely to share the FBI and ODNI’s bias toward the security
mission. Unless a recipient of a FISC order challenges the legitimacy of that
order, proceedings in the FISC are not subject to an adversarial process.325
Instead, like magistrate judges considering whether to issue traditional
search warrants, FISC judges review unopposed government applications
for surveillance orders.326 The FISC thus receives only the Justice Department’s
perspective—heavily informed by the FBI’s perspective—about any given rule. This
concern is compounded by the fact that even the judges themselves largely hail from the
law enforcement community—twelve of the fourteen judges who have served this year
are former prosecutors and one is a former state police director.327 Moreover, once
selected by the Chief Justice of the Supreme Court for FISC service, these judges are
exposed to a constant stream of government applications to engage in foreign
intelligence collection detailing just how dangerous the world can be and the important
role that intelligence collection plays in combating those dangers.328 FISC
involvement thus serves only to reinforce the pro-security perspective
already embedded in the development of domesticintelligence- collection
policies.
Empirically true
Brand, 15 - Dean and Professor Emeritus and Chairman of the Center for Law and
Global Justice, University of San Francisco School of Law (Jeffrey, “Eavesdropping on
Our Founding Fathers: How a Return to the Republic's Core Democratic Values Can
Help Us Resolve the Surveillance Crisis” 6 Harv. Nat'l Sec. J. 16 Harv. Nat'l Sec. J. 1,
lexis)
That prediction also came to pass. In 2005, the New York Times revealed the
Bush Administration's Terrorist Surveillance Program (TSP) that
authorized warrantless surveillance on a massive scale that clearly violated
the dictates of FISA and the Patriot Act. Initially, the Bush Administration argued that
the program was legal, citing the 9/11 attacks and national security emergencies.
Ultimately, a simpler path was taken: the Administration went to and received ex
post facto approval from the FISA court. n189 A moment of accountability-the Bush Administration's acknowledgement that it had engaged in illegal
surveillance--was side-stepped by simply seeking the approval of the court
charged with monitoring the illegal activity, thereby making the Executive
Branch unaccountable yet again. n190
The structure of the FISA court--shrouded in secrecy and devoid of any
opposition to the government's position--also took its toll on the
accountability of the Executive Branch to the Congress, a consequence that also
had been roundly predicted during the FISA debates. Senators Abourezk, Hart, and
Mathias candidly acknowledged throughout the debates over S. 3197, "In depth
congressional oversight is a crucial element of the safeguards which justify embarking
on the [FISA] legislative scheme." n191 Representative Ertel hoped that [*47] FISA's
congressional reporting requirements would serve that end. n192
Public FISC Advocate DA
FISC review only has a weak effect on executive deterrence
Setty, 15 - Professor of Law and Associate Dean for Faculty Development & Intellectual
Life, Western New England University School of Law (Sudha, “Surveillance, Secrecy,
and the Search for Meaningful Accountability” 51 Stan. J Int'l L. 69, Winter, lexis)
The FISC differs from Article III courts in numerous ways: Its statutory scope
is limited to matters of foreign intelligence gathering; its judges are appointed in the
sole discretion of the Chief Justice of the United States Supreme Court; its
proceedings are secret; its opinions are often secret or are published in
heavily [*83] redacted form; and its process is not adversarial as only government
lawyers make arguments defending the legality of the surveillance being contemplated.
n70 Many of these differences bring into doubt the legitimacy of the court,
its ability to afford adequate due process regarding civil liberties concerns, and
its ability to uphold the rule of law in terms of government accountability.
Compounding this legitimacy deficit is the FISC's own loosening of the
relevance standard under Section 215 of the PATRIOT Act such that the FISC has
found that bulk data collection without any particularized threat or
connection to terrorism is legally permissible. n71
Historically, the FISC has rejected NSA surveillance applications too infrequently to be
considered a substantial check on government overreach as an ex ante matter. n72 As
an ex post matter, it is unclear to what extent the FISC's work guarantees
any meaningful accountability over NSA surveillance activities. On the one
hand, because the FISC lacks an adversarial process and has no independent
investigatory authority, the FISC only addresses ex post compliance problems when the
government itself brings the problem to the court's attention. n73 As such, FISC
judges rely on the statements of the government as to the government's own
behavior and lack the authority to investigate the veracity of the
government's representations. n74 For example, in 2011, the FISC found one
aspect of the surveillance program - brought to its attention months after the program
went into effect n75 - to be unconstitutional. n76 Additionally, in one declassified
opinion, the FISC critiques the NSA's sloppy over-collection of metadata of U.S.
communications, and questions the efficacy of bulk data collection as a national security
measure. n77 At one point, the FISC sanctioned the NSA for overreaching in [*84]
saving all metadata and running daily metadata against an "alert list" of approximately
17,800 phone numbers, only 10% of which had met FISC's legal standard for reasonable
suspicion. n78 On such occasions, the administration has modified problematic aspects
of the surveillance and continued forward without further impediment by the FISC. n79
On the other hand, the fact that the NSA itself has brought potential
compliance incidents to the notice of the FISC n80 indicates at least some
internal policing of these programs. However, this is hardly an effective
substitute for external review and accountability mechanisms that would
ensure that consistent controls are in place. Further, the self-reporting of these
compliance incidents does not in any way allow for discourse over the
larger structural questions surrounding the surveillance programs.
Finally, the ability of the FISC to act as an effective check on NSA
overreaching is severely limited by the secrecy and lack of information
available to the FISC judges. Judge Reggie B. Walton, formerly the Chief Judge of
the FISC, lamented that "the FISC is forced to rely upon the accuracy of the information
that is provided to the Court ... . The FISC does not have the capacity to investigate
issues of noncompliance ... ." n81 The ability of the NSA to not only gather and retain
bulk metadata, but also to build in backdoor access into data files despite private
encryption efforts has been largely sanctioned by the FISC based on NSA
representations as to the seriousness of the security threats posed to the nation. n82 In
an environment in which there is a tremendous fear of being held responsible for any
future terrorist attack that might occur on U.S. soil, n83 and in which there is a [*85]
information deficit for those outside of the intelligence community, the FISC has
consistently deferred to the NSA's assertions and has not been able to act as an
effective accountability mechanism.
A public advocate in the FISC will not change anything
Pangburn 14
DJ Pangburn staff writer for VICE, Boing Boing and Makeshift writing for Motherboard.
“The Problem with Obama's New Public Privacy Advocate”
http://motherboard.vice.com/blog/the-problem-with-obamas-new-public-privacyadvocate //EM
If libertarians are right about any large politico-philosophical issue, it is that more
bureaucracy hardly ever helps, especially over time. And so it's likely to be
when President Obama appoints a public privacy advocate, as the Los Angeles
Times reported today. How will this privacy ombudsman remain independent in
Foreign Intelligence Surveillance Court (FISC) hearings, when the court's
judges were supposed to essentially fill the exact same role in the first
place? Who the hell knows. It seems quite a bit like government PR that won't
have any real, substantive privacy impact in the short or long term. The
only way the position could come close to working is if some distinguished
privacy activist with no cozy government or tech company ties were
appointed to the post. It won't work if the advocate is a career bureaucrat or
tech evangelist for companies that live off of data mining dollars. That means
no ex-Google, Facebook, Microsoft, or Apple executives, and certainly no ex-NSA or other
intelligence professionals. There are plenty of folks in and around the fringes of the tech world
that would do a marvelous job in critiquing surveillance measures and ensuring privacy. Look
back to the late Roman republic for a moment. The Tribune of the People system was
developed to give the people an advocate against aristocratic, Senatorial control of public life.
For a time, it worked. But when tribunes like the brothers Gracchi wielded too much populist
power, they ran into the merciless anvil of the state. Eventually, the tribunes became vehicles
for manipulation, rarely discharging any of their original duties. Obama knows how such
populist maneuvers can placate the masses, so isn't it rather foolish to buy into his designs? Is it
fair to compare Obama's public advocate to Roman history? Perhaps not, but there is ample
evidence of citizen protection bureaucrats and public advocates being
nearly worthless. The New York City public advocate position, for instance, has been under
fire for years. Look at the Environmental Protection Agency's timidity in going after fracking
during an election year, as detailed in the Gasland documentaries. The Justice Department
failed to put subprime mortgage and credit default swap criminals in prison out of some selfpreservational move to appease Wall Street. And what became of the privacy
protections set up as a buffer against the Patriot Act's surveillance powers?
Clearly, they didn't work. If we reject Obama's move, where does this leave us? Well,
the best outcome is a legislative one. Ron Wyden's Intelligence Oversight and Surveillance
Reform Act bill is the better option. On the other hand, the Supreme Court deciding the matter
is even worse than Obama's public advocate move. But, can there be any real hope with Obama
on surveillance and privacy, or just some more of the same? I wouldn't bet on the former. If
Obama wants a real public advocate in FISC hearings, why not give Edward Snowden a call? Yes,
he's ex-NSA, but who has been a better critic of surveillance and advocate for privacy?
Perm
Perm do both – the FAA includes ex post review mechanisms
that solve the link
Blum, 9 (Stephanie, “WHAT REALLY IS AT STAKE WITH THE FISA AMENDMENTS
ACT OF 2008 AND IDEAS FOR FUTURE SURVEILLANCE REFORM” 18 B.U. Pub. Int.
L.J. 269, Spring, lexis)
If the Note's assertions are true, the FAA has one advantage over the traditional
FISA in that the FAA relies more on ex post mechanisms. For example, the
FAA imposes reporting requirements to Congress n253 and inspector
general reviews, n254 rather than relying solely on ex ante warrants issued
by a secret court. While under the FAA the FISC issues ex ante certifications
concerning the executive's targeting and minimization procedures, these
are programmatic reviews and not based on individualized suspicion of
suspects as is required by traditional FISA. Given the arguably limited
effectiveness of ex ante warrants issued by a secret court based on one-sided evidence,
the FAA's greater reliance on ex post review mechanisms could be viewed as a
significant improvement over traditional FISA. As Georgetown law professor Neal
Katyal observed, "reporting requirements are powerful devices" that promote external
checks on excessive executive power. n255
In contrast, the high degree of judicial deference in ex ante review may simply result
from quality applications. Applications for traditional FISA warrants must survive
considerable review by the executive branch prior to submission to the FISC; hence, it
can be presumed that some, if not many, applications are not brought. As Alan
Dershowitz notes, "although the FISA court has only rarely denied requests for national
security wiretaps, the very existence of this court and the requirement of sworn
justification serves as a check on the improper use of the powerful and intrusive
technologies that are permitted in national security cases." n256 Hence, there are two
ways to look at ex ante review: one could either argue that FISA "forces the executive to
self-censor its requests," or that the judiciary is "acting merely as a 'rubber stamp.'"
n257 The reality is probably a little of both.
The FAA contains both ex ante and newly imposed ex post review
mechanisms. While the ex ante review under the FAA is not based on individualized
determinations about suspects, but rather focuses on programmatic reviews, because of
its heavy ex post reporting mechanisms, it seems that the FAA creates [*308] a
balanced structure that may prevent executive branch abuse while still
protecting the nation from another terrorist attack.
Ex post review alone fails – courts lack institutional expertise to
review surveillance risks
Harvard Law Review, 8 – no author cited, “SHIFTING THE FISA PARADIGM:
PROTECTING CIVIL LIBERTIES BY ELIMINATING EX ANTE JUDICIAL APPROVAL”
http://cdn.harvardlawreview.org/wpcontent/uploads/pdfs/shifting_the_FISA_paradigm.pdf
2. Judicially Ordered Notice to Wrongfully Surveilled Persons. — Another approach
would provide a stronger statutory cause of action for improper surveillance, adding
an ex post review function to the FISC. Such a scheme would “provide
compensation to individuals subject to the most grievous instances of
unlawful electronic surveillance” by giving the FISC power to “screen for these
violations and discretionarily notify an individual,” and then compensate him or her if
appropriate.82 This approach is commendable for attempting to remedy the lack of
adversariality and the fact that improper surveillance that occurs after a FISC order is
issued — when either changed circumstances or invalid governmental motives never
come to light because the government does not attempt criminal prosecution — may go
unchecked.83 But the suggested remedy, to broaden notice by making a “distinction
. . . between disclosure that concretely threatens national security and disclosure that
would merely embarrass the government,” 84 seems unworkable. Such line
drawing necessarily involves crucial policy determinations that the courts
are in a bad institutional position to make. Moreover, the ability of the
remedy to provide a check on the government seems at best dubious and
could even be viewed as permitting the government to purchase the ability
to invade constitutional liberties.
Presidential powers DA
The perception of protection alone prevents a larger backlash
against presidential power
Small, 8 - United States Air Force Academy (Matthew, “His Eyes are Watching You:
Domestic Surveillance, Civil Liberties and Executive Power during Times of National
Crisis” http://cspc.nonprofitsoapbox.com/storage/documents/Fellows2008/Small.pdf
In fact, reasonable arguments can be made that there is no clearly formed public
mandate demanding the consideration of an American citizen’s right to privacy as
important, if not more so, than national security. There exists only a concern of
abridgement of their right, but this concern does not equate to motivating factor for
government constraint. Studies show that from 1974 to 1983 Americans perceived little
impact of privacy invasion, in its rare instances, on their lives (Katz and Tassone 1990,
125). Simultaneously, however, Americans did not, and still do not,17 favor wiretaps
regardless of the presence of warrants (Katz and Tassone 1990, 130-131). Despite this, it
appears that the public realizes the necessity of the power of the president to abridge
certain rights in order to ensure national security. The public voices its concern but
stops far short of forcing the government to restrain itself. Legislatures listen to the
“broad climate of opinion” (Gandy Jr. 2003, 285) and that climate allows President
Bush to act as he did.18 Like Abraham Lincoln, President Bush realized inadequacy
within the government institutions tasked with keeping America safe through the
collection of information on internal threats. In order to effectively combat terrorism,
the NSA needed the ability to expand operations within the US. President Bush, in the
manner of his Civil War predecessor, expanded his power to better equip the NSA to
handle the threat. Court cases and legislation concerning wiretapping and
intrusive domestic surveillance techniques only establish guidelines to give
degrees of protection, but more importantly the perception of protection.19
This still leaves the president with the room to maneuver within these
guidelines to maintain national security at the expense of complete civil liberty.
Justice Black’s dissensions shed more light on this paradox that even though the courts
deemed warrantless wiretaps an invasion of privacy, they still continue. There remains
those of the persuasion that wiretapping is a viable information gathering tool and
admissible in court with or without an accompanying warrant because the Forth
Amendment is not a protection of privacy. In American history, domestic surveillance,
later to include electronic surveillance, proved necessary to enforce those laws passed by
Congress that quelled rebellion and silenced dissidents. Presently, the USA Patriot Act
and other similar legislation requires an increase in domestic electronic surveillance in
order to combat terrorism; so in the interest of adhering to the letter and the spirit of
the law, President Bush must expand the use of domestic electronic surveillance.
President Bush took the precedent set by his predecessors and acted accordingly when
the United States plummeted into turmoil. What is important now is for the
president to realize when his power has reached its limit. The crux of the
problem lies in justifying the remainder of a threat to American citizens. While the
attacks of 9/11 still linger within the American psyche and legislation supports executive
action, this task is less daunting. American citizens can stand some breaches in privacy
but those breaches must not be permanent. Popular sentiment and legislation may
currently favor expanded presidential power but President Bush, or any subsequent
president, would be remiss in assuming that it will remain as such for the duration of
the struggle against international terrorism. The fickle nature of public and
Congressional support in the domestic intelligence realm thus requires a
great deal of prudence on the part of the president.
There are some indicators, albeit vague ones, of when domestic surveillance policy
should yield to citizens’ right to privacy. Following the progression witnessed during the
Cold War it would be reasonable to expect that opposition to presidential power would
first come in the form of Supreme Court rulings striking down certain powers as
unconstitutional followed by public opinion more heavily favoring the right to privacy
and finally, legislation codifying judicial rulings in accordance with public opinion.
Court cases challenging the president’s power under the USA Patriot Act have already
surfaced. Both the American Civil Liberties Union (ACLU) and the Center for
Constitutional Rights (CCR) have already filed formal complaints against the executive
branch. The CCR, in particular, directly attacked the president’s power to conduct
electronic surveillance without a court order as criminal under the provisions of FISA.
Similarly, the Electronic Frontier Foundation sued AT&T for violating free speech and
the right to privacy by aiding the NSA. Although the president has fought these
allegations, fighting most vehemently in the AT&T case, none of the cases reached the
Supreme Court. The legal actions precipitated neither legislative response nor changes
in executive policy. If, however, the populous feels so compelled as to bring the matter
before the Supreme Court, the president risks losing the policy initiative as one
or more unfavorable rulings may force Congress to act on behalf of the right
to privacy. The president must take care to ensure that domestic
surveillance policies are commensurate with the actual national security
threat.
Although the war has no foreseeable end, the president’s actions must have one. That
end must be in concert with Congress and must demonstrate to the American people
that the security of the US, and by default their own freedom, is better because of it. If
not, the president risks losing all legitimacy and having his power
constrained to the point where neither he nor the agencies below him can
effectively protect the nation.
Terror DA
2AC - Short
No Link: The use restrictions in PPD28 include terrorism, means
that the surveillance necessary to prevent terror is still available.
Link turn: Surveillance makes counter-terror tools ineffective
Corrigan 2015 (Ray [senior lecturer in mathematics, computing, and technology at the
Open University, U.K.]; Mass Surveillance Will Not Stop Terrorism; Jan 25;
www.slate.com/articles/health_and_science/new_scientist/2015/01/mass_surveillanc
e_against_terrorism_gathering_intelligence_on_all_is_statistically.html; kdf)
Police, intelligence, and security systems are imperfect. They process vast amounts of
imperfect intelligence data and do not have the resources to monitor all known suspects 24/7. The French authorities lost track of
these extremists long enough for them to carry out their murderous acts.
You cannot fix any of this by
treating the entire population as suspects and then engaging in
suspicionless, blanket collection and processing of personal data. Mass data collectors can dig
deeply into anyone’s digital persona but don’t have the resources to do so
with everyone. Surveillance of the entire population, the vast majority of whom are innocent,
leads to the diversion of limited intelligence resources in pursuit of huge
numbers of false leads. Terrorists are comparatively rare, so finding one is a needle-in-a-haystack problem. You
don’t make it easier by throwing more needleless hay on the stack. It is statistically impossible for total
population surveillance to be an effective tool for catching terrorists. Even if
your magic terrorist-catching machine has a false positive rate of 1 in
1,000—and no security technology comes anywhere near this—every time
you asked it for suspects in the U.K. it would flag 60,000 innocent people. Law
enforcement and security services need to be able to move with the times, using modern digital technologies intelligently and
through targeted data preservation—not a mass surveillance regime—to engage in court-supervised technological surveillance of
individuals whom they have reasonable cause to suspect. That is not, however, the same as building an infrastructure of mass
surveillance. Mass
surveillance makes the job of the security services more
difficult and the rest of us less secure.
No Impact: NSA’s bulk surveillance does nothing anyway circumvention is only necessary to prevent delays, but the
government delays later on in the process
Cahall et al ’14 (Bailey Cahall is a Policy Analyst @ New America and went to the
Maxwell School of Citizenship and Public Affairs, Syracuse University. David Sterman is
a program associate at New America and holds a master's degree from Georgetown’s
Center for Security Studies. Emily Schneider has a J.D. from Syracuse University, a M.A.
degree in English from the University of Rochester, and a B.A. degree in English from
Pennsylvania State University and she is an advisory council member for the Global
Accountability Initiative. Peter Bergen is CNN's national security analyst, a Professor of
Practice at Arizona State University and a fellow at Fordham University's Center on
National Security, New America, 1/13/14, “DO NSA'S BULK SURVEILLANCE
PROGRAMS STOP TERRORISTS?”, https://www.newamerica.org/internationalsecurity/do-nsas-bulk-surveillance-programs-stop-terrorists/)//KY
Surveillance of American phone metadata has had no discernible impact on
preventing acts of terrorism and only the most marginal of impacts on
preventing terrorist-related activity, such as fundraising for a terrorist group.
Furthermore, our examination of the role of the database of U.S. citizens’
telephone metadata in the single plot the government uses to justify the
importance of the program – that of Basaaly Moalin, a San Diego cabdriver who
in 2007 and 2008 provided $8,500 to al-Shabaab, al-Qaeda’s affiliate in Somalia
– calls into question the necessity of the Section 215 bulk collection
program. According to the government, the database of American phone
metadata allows intelligence authorities to quickly circumvent the
traditional burden of proof associated with criminal warrants, thus
allowing them to “connect the dots” faster and prevent future 9/11-scale
attacks. Yet in the Moalin case, after using the NSA’s phone database to link
a number in Somalia to Moalin, the FBI waited two months to begin an
investigation and wiretap his phone. Although it’s unclear why there was a
delay between the NSA tip and the FBI wiretapping, court documents show
there was a two-month period in which the FBI was not monitoring
Moalin’s calls, despite official statements that the bureau had Moalin’s
phone number and had identified him. , This undercuts the government’s
theory that the database of Americans’ telephone metadata is necessary to
expedite the investigative process, since it clearly didn’t expedite the
process in the single case the government uses to extol its virtues.
Additionally, a careful review of three of the key terrorism cases the
government has cited to defend NSA bulk surveillance programs reveals
that government officials have exaggerated the role of the NSA in the cases
against David Coleman Headley and Najibullah Zazi, and the significance of
the threat posed by a notional plot to bomb the New York Stock Exchange.
Aff outweighs the DA: Soft power relations are key to
cooperation to take down terror
Alt Causes: economic, social, and political problems ensure
terrorism continues despite surveillance
2AC Long
No Link: The use restrictions in PPD28 include terrorism, means
that the surveillance necessary to prevent terror is still available.
Link turn: Surveillance makes counter-terror tools ineffective
Corrigan 2015 (Ray [senior lecturer in mathematics, computing, and technology at the
Open University, U.K.]; Mass Surveillance Will Not Stop Terrorism; Jan 25;
www.slate.com/articles/health_and_science/new_scientist/2015/01/mass_surveillanc
e_against_terrorism_gathering_intelligence_on_all_is_statistically.html; kdf)
Police, intelligence, and security systems are imperfect. They process vast amounts of
imperfect intelligence data and do not have the resources to monitor all known suspects 24/7. The French authorities lost track of
these extremists long enough for them to carry out their murderous acts.
You cannot fix any of this by
treating the entire population as suspects and then engaging in
suspicionless, blanket collection and processing of personal data. Mass data collectors can dig
deeply into anyone’s digital persona but don’t have the resources to do so
with everyone. Surveillance of the entire population, the vast majority of whom are innocent,
leads to the diversion of limited intelligence resources in pursuit of huge
numbers of false leads. Terrorists are comparatively rare, so finding one is a needle-in-a-haystack problem. You
don’t make it easier by throwing more needleless hay on the stack. It is statistically impossible for total
population surveillance to be an effective tool for catching terrorists. Even if
your magic terrorist-catching machine has a false positive rate of 1 in
1,000—and no security technology comes anywhere near this—every time
you asked it for suspects in the U.K. it would flag 60,000 innocent people. Law
enforcement and security services need to be able to move with the times, using modern digital technologies intelligently and
through targeted data preservation—not a mass surveillance regime—to engage in court-supervised technological surveillance of
individuals whom they have reasonable cause to suspect. That is not, however, the same as building an infrastructure of mass
surveillance. Mass
surveillance makes the job of the security services more
difficult and the rest of us less secure.
No Impact: NSA’s bulk surveillance does nothing anyway circumvention is only necessary to prevent delays, but the
government delays later on in the process
Cahall et al ’14 (Bailey Cahall is a Policy Analyst @ New America and went to the
Maxwell School of Citizenship and Public Affairs, Syracuse University. David Sterman is
a program associate at New America and holds a master's degree from Georgetown’s
Center for Security Studies. Emily Schneider has a J.D. from Syracuse University, a M.A.
degree in English from the University of Rochester, and a B.A. degree in English from
Pennsylvania State University and she is an advisory council member for the Global
Accountability Initiative. Peter Bergen is CNN's national security analyst, a Professor of
Practice at Arizona State University and a fellow at Fordham University's Center on
National Security, New America, 1/13/14, “DO NSA'S BULK SURVEILLANCE
PROGRAMS STOP TERRORISTS?”, https://www.newamerica.org/internationalsecurity/do-nsas-bulk-surveillance-programs-stop-terrorists/)//KY
Surveillance of American phone metadata has had no discernible impact on
preventing acts of terrorism and only the most marginal of impacts on
preventing terrorist-related activity, such as fundraising for a terrorist group.
Furthermore, our examination of the role of the database of U.S. citizens’
telephone metadata in the single plot the government uses to justify the
importance of the program – that of Basaaly Moalin, a San Diego cabdriver who
in 2007 and 2008 provided $8,500 to al-Shabaab, al-Qaeda’s affiliate in Somalia
– calls into question the necessity of the Section 215 bulk collection
program. According to the government, the database of American phone
metadata allows intelligence authorities to quickly circumvent the
traditional burden of proof associated with criminal warrants, thus
allowing them to “connect the dots” faster and prevent future 9/11-scale
attacks. Yet in the Moalin case, after using the NSA’s phone database to link
a number in Somalia to Moalin, the FBI waited two months to begin an
investigation and wiretap his phone. Although it’s unclear why there was a
delay between the NSA tip and the FBI wiretapping, court documents show
there was a two-month period in which the FBI was not monitoring
Moalin’s calls, despite official statements that the bureau had Moalin’s
phone number and had identified him. , This undercuts the government’s
theory that the database of Americans’ telephone metadata is necessary to
expedite the investigative process, since it clearly didn’t expedite the
process in the single case the government uses to extol its virtues.
Additionally, a careful review of three of the key terrorism cases the
government has cited to defend NSA bulk surveillance programs reveals
that government officials have exaggerated the role of the NSA in the cases
against David Coleman Headley and Najibullah Zazi, and the significance of
the threat posed by a notional plot to bomb the New York Stock Exchange.
Aff outweighs the DA: Soft power relations are key to
cooperation to take down terror
Alt Causes: economic, social, and political problems ensure
terrorism continues despite surveillance
Dabrowski ’97 (Mariusz Dabrowski from the Public Politics Project @ Towson State
University, “Causes of Modern Terrorism”, 5/13/97,
http:///www.towson.edu/polsci/ppp/terror/causes.html)//KY
The current global wave of terrorism, in many ways, originated and was
fueled by events in the Middle East, particularly the ongoing Arab-Israeli conflict.
Some of the world's most violent terrorist acts have been committed in the name of
Palestinian self determination and the destruction of Israel. Israel's official creation in
1948 began an intermittent conflict which lasts to this day. Palestinians maintain Israeli
lands were promised to them by British colonial authorities. Israel's Arab neighbors
failed to destroy Israel by conventional military means, so radical Palestinians believed
terror tactics were the only other choice. Even prior to Israel's formation, Jewish settlers
used terrorism against British colonial authorities and Palestinian Arabs living in the
area to affect the creation of a Jewish state. Consequently, Arabs reciprocated. In 1964,
the major Palestinian terrorist groups formed a coalition called the Palestine Liberation
Organization (PLO) under the leadership of Yasser Arafat. The PLO's stated mission
included the annihilation of Israel and establishment of a Palestinian state. The terror
escalated to a global scale after the 1967 Six Day War when Israel annexed Palestinian
lands on the west bank of the Jordan River and Gaza Strip near the Sinai Peninsula.
The causes of Middle East terrorism are mainly political. The dispute is over
possession of land. Palestinians considered the territory occupied by Israel rightfully
theirs. Aside from the land dispute, a social element is also present in this
situation. Israel is the only non-Muslim nation in the Middle East, therefore it vividly
stands out as "different," or an "invader." Islam is more than just a religion to its
faithful. It is a prescription for life; dictating social norms in addition to civil and
criminal law. The existence of Israel is viewed as an invasion of the western world's
"corrupting" influence. To fundamentalist Muslims the West, led by the United States,
is characterized by the inequity and exploitation of capitalism, a philosophy
centered on the individual. Islam on the other hand, is based on a more egalitarian
and group-focused philosophy. But the main reason Muslims are opposed to
Western influence concerns the attractiveness of capitalism. While Marxists have
attempted to paint capitalism as evil and decadent, they have failed to account for its
comparative efficiency in allocating resources and generally raising living standards.
Coupled with the fact that life in the West is often glamorously portrayed by the media,
religious leaders fear Muslims will be corrupted by Western greed and forsake their
Muslim faith. This fact is one explanation for the increase in Muslim fundamentalism in
the Middle East. Fundamentalist terrorist groups like Hizballah and Hamas are
infamous for their fanatical tactics, most notably suicide bombings. Religious zealots
will be recruited by these groups to take explosives, either strapped to their bodies or in
vehicles, and detonate those explosives, killing themselves, and destroying the
assigned target. In 1983, a Hizballah suicide bomber drove the bomb-laden truck
which destroyed the U.S. Marine barracks in Beirut, Lebanon killing over 200 Marines.
More recently, Hamas suicide bombers have blown-up a number of buses in Israel. The
Muslim fanatics are convinced killing themselves in the process of killing their enemies
is a path to martyrdom and eternal salvation. Middle East terrorism has fueled the
global wave of terrorism because a variety of terrorist groups (IRA, ETA,
Japanese Red Army, Baader-Meinhof Gang, etc.) have received training and support
from Palestinian terrorist groups, particularly the PLO.
Their “experts” have motive to exaggerate the likelihood of an
attack
Weiss 2015 (Leonard [visiting scholar at Stanford University’s Center for International
Security and Cooperation]; On fear and nuclear terror; Mar 3; Bulletin of the Atomic
Scientists 2015, Vol. 71(2) 75–87; kdf)
There is a tendency on the part of security policy advocates to hype security
threats to obtain support for their desired policy outcomes. They are free to do so in a
democratic society, and most come by their advocacy through genuine conviction that a real security threat is receiving insufficient attention. But
there is now enough evidence of how such advocacy has been distorted for
the purpose of overcoming political opposition to policies stemming from
ideology that careful public exposure and examination of data on claimed
threats should be part of any such debate. Until this happens, the most
appropriate attitude toward claimed threats of nuclear terrorism, especially when accompanied by advocacy of policies intruding
on individual freedom, should be one of skepticism. Interestingly, while all this attention to nuclear terrorism goes on, the
United States and other nuclear nations have no problem promoting the use of nuclear power and national nuclear programs (only for friends, of
course) that end up creating more nuclear materials that can be used for weapons. The use of civilian nuclear programs to disguise national weapon
ambitions has been a hallmark of proliferation history ever since the Atoms for Peace program (Sokolski, 2001), suggesting that the real nuclear threat
resides where it always has resided-in national nuclear programs; but placing the threat where it properly belongs does not carry the public-relations
frisson currently attached to the word “terrorism.”
Terrorists lack the motivation, even if they got weapons, there’d
be no attack
Weiss 2015 (Leonard [visiting scholar at Stanford University’s Center for International
Security and Cooperation]; On fear and nuclear terror; Mar 3; Bulletin of the Atomic
Scientists 2015, Vol. 71(2) 75–87; kdf)
A recent paper (Friedman and Lewis, 2014) postulates a scenario by which terrorists
might seize nuclear materials in Pakistan for fashioning a weapon. While jihadist sympathizers are
known to have worked within the Pakistani nuclear establishment, there is little to no evidence that
terrorist groups in or outside the region are seriously trying to obtain a
nuclear capability. And Pakistan has been operating a uranium enrichment plant for its weapons program for nearly
30 years with no credible reports of diversion of HEU from the plant. There is one stark example of a terrorist organization that
actually started a nuclear effort: the Aum Shinrikyo group. At its peak, this religious cult had a membership estimated in the tens of
thousands spread over a variety of countries, including Japan; its members had scientific expertise in many areas; and the group was
well funded. Aum Shinrikyo obtained access to natural uranium supplies, but the nuclear weapon effort stalled and was abandoned.
The group was also interested in chemical weapons and did produce sarin nerve gas with which they attacked the Tokyo subway
system, killing 13 persons. AumShinrikyo is now a small organization under continuing close surveillance. What about highly
organized groups, designated appropriately as terrorist, that have acquired enough territory
to enable them to operate in a quasigovernmental fashion, like the Islamic State (IS)?
Such organizations are certainly dangerous, but how would nuclear terrorism fit in with a
program for building and sustaining a new caliphate that would restore
past glories of Islamic society, especially since, like any organized government, the Islamic State would itself be vulnerable
to nuclear attack? Building a new Islamic state out of radioactive ashes is an
unlikely ambition for such groups. However, now that it has become notorious, apocalyptic
pronouncements in Western media may begin at any time, warning of the possible acquisition and use of nuclear weapons by IS.
Even if a terror group were to achieve technical nuclear proficiency, the
time, money, and infrastructure needed to build nuclear weapons creates
significant risks of discovery that would put the group at risk of attack. Given
the ease of obtaining conventional explosives and the ability to deploy them, a terrorist group is unlikely to exchange a big part of its
operational program to engage in a risky nuclear development effort with such doubtful prospects. And, of course, 9/11
heightened sensitivity to the need for protection, lowering further the
probability of a successful effort.
has
2AC – Cyberterror
No Link: The use restrictions in PPD28 include terrorism, means
that the surveillance necessary to prevent terror is still available.
Link Turn – Cyber terror is comparatively worse than regular
terror.
Purpura ‘7 (Phillip Purpura has been a criminal justice educator for more than 20
years. He has directed criminal justice, security, and paralegal programs, and has
practical experience as a security consultant, expert witness, security manager,
corporate investigator, and police officer, Butterworth-Heinemann Boston, 07 Dec
2006, “Terrorism and homeland security : an introduction with applications”)//KY
CYBERTERRORISM Cyberterrorism refers to the exploitation and attack of cyberspace
targets by terrorists as a method to cause harm to reach terrorist goals. Because of our
widespread dependence on information technology, telecommunications, and the
Internet, cyberspace is a tempting target for terrorists. The targets for attack
are endless-disruption of electrical power grids, international financial
transactions, air traffic controls, drinking water systems, and so forth. Our
infrastructure, busi- nesses, and institutions are already battling viruses and worms
from hackers. If terrorists expand the assault, then creativity, boldness, and lethality are
likely to take on new meanings. Although there have been few cyberterrorism attacks
(Denning, 2001: 281), terrorists are notorious for locating target weaknesses to exploit
for spectacular losses. If cyberwarfare is an indication of what will occur in the
future, the threat of cyberterrorism appears more ominous. The military of
many countries has expanded operations to cyberspace and “cold cyberspace battles”
have been fought. Israeli and Palestinian hackers have attacked each other‘s Internet
infrastructures (Kabay and Walsh, 2000: 34). As a world power, US. government sites
are attacked repeatedly. In 2001, following the loss of a Chinese fighter jet in a collision
with a US. reconnaissance aircraft, pro-Chinese hackers defaced or crashed 100 US.
government and commercial Web sites. American hackers retaliated by
damaging 300 Chinese Web sites (National Infrastructure Protection Center, 2001)
Like hackers, cyberterrorists have the advantage of attacking from almost anywhere, by
them- selves, at minimal expense, without risk of harm, and with limited risk of
detection. Furthermore, cyberterrorists can cover their tracks and, with the use of
encryption programs that are almost unbreakable, make the attack appear as if it
originated from another source. These encryption programs also provide more
secure communications among terrorists (Denning, 2001)
No Impact: NSA’s bulk surveillance does nothing –
circumvention is only necessary to prevent delays, but the
government delays later on in the process
Cahall et al ’14 (Bailey Cahall is a Policy Analyst @ New America and went to the
Maxwell School of Citizenship and Public Affairs, Syracuse University. David Sterman is
a program associate at New America and holds a master's degree from Georgetown’s
Center for Security Studies. Emily Schneider has a J.D. from Syracuse University, a M.A.
degree in English from the University of Rochester, and a B.A. degree in English from
Pennsylvania State University and she is an advisory council member for the Global
Accountability Initiative. Peter Bergen is CNN's national security analyst, a Professor of
Practice at Arizona State University and a fellow at Fordham University's Center on
National Security, New America, 1/13/14, “DO NSA'S BULK SURVEILLANCE
PROGRAMS STOP TERRORISTS?”, https://www.newamerica.org/internationalsecurity/do-nsas-bulk-surveillance-programs-stop-terrorists/)//KY
Surveillance of American phone metadata has had no discernible impact on
preventing acts of terrorism and only the most marginal of impacts on
preventing terrorist-related activity, such as fundraising for a terrorist group.
Furthermore, our examination of the role of the database of U.S. citizens’
telephone metadata in the single plot the government uses to justify the
importance of the program – that of Basaaly Moalin, a San Diego cabdriver who
in 2007 and 2008 provided $8,500 to al-Shabaab, al-Qaeda’s affiliate in Somalia
– calls into question the necessity of the Section 215 bulk collection
program. According to the government, the database of American phone
metadata allows intelligence authorities to quickly circumvent the
traditional burden of proof associated with criminal warrants, thus
allowing them to “connect the dots” faster and prevent future 9/11-scale
attacks. Yet in the Moalin case, after using the NSA’s phone database to link
a number in Somalia to Moalin, the FBI waited two months to begin an
investigation and wiretap his phone. Although it’s unclear why there was a
delay between the NSA tip and the FBI wiretapping, court documents show
there was a two-month period in which the FBI was not monitoring
Moalin’s calls, despite official statements that the bureau had Moalin’s
phone number and had identified him. , This undercuts the government’s
theory that the database of Americans’ telephone metadata is necessary to
expedite the investigative process, since it clearly didn’t expedite the
process in the single case the government uses to extol its virtues.
Additionally, a careful review of three of the key terrorism cases the
government has cited to defend NSA bulk surveillance programs reveals
that government officials have exaggerated the role of the NSA in the cases
against David Coleman Headley and Najibullah Zazi, and the significance of
the threat posed by a notional plot to bomb the New York Stock Exchange.
AT: Nuclear Terror
No risk of nuclear terror – leading expert
Weiss 2015 (Leonard [visiting scholar at Stanford University’s Center for International
Security and Cooperation]; On fear and nuclear terror; Mar 3; Bulletin of the Atomic
Scientists 2015, Vol. 71(2) 75–87; kdf)
Fear of nuclear weapons is rational, but its extension to terrorism has been a vehicle for fearmongering that is unjustified by available data. The debate on nuclear
terrorism tends to distract from events that raise the risk of nuclear war,
the consequences of which would far exceed the results of terrorist attacks.
And the historical record shows that the war risk is real. The Cuban Missile Crisis and other confrontations have demonstrated that
miscalculation, misinterpretation, and misinformation could lead to a ‘close call’ regarding nuclear war. Although there has been
much commentary on the interest that Osama bin Laden, when he was alive, reportedly expressed in obtaining nuclear weapons,
evidence of any terrorist group working seriously toward the theft of
nuclear weapons or the acquisition of such weapons by other means is
virtually nonexistent. The acquisition of nuclear weapons by terrorists
requires significant time, planning, resources, and expertise, with no
guarantees that an acquired device would work. It requires putting aside at
least some aspects of a groups more immediate activities and goals for an
attempted operation that no terrorist group has accomplished. While absence of
evidence does not mean evidence of absence, it is reasonable to conclude that the fear of
nuclear terrorism has swamped realistic consideration of the threat.
AT: Lone Wolves
No lone wolf terror
Becker, 12/14/14 [The Foreign Policy Essay: Wolves Who Are Lonely By Michael
Becker Sunday, December 14, 2014 at 10:00 AM, Michael Becker is a Ph.D. student in
political science at Northeastern University. His research focuses on international
security, conflict, and terrorism. He can be reached at
becker.m@husky.neu.edu.http://www.lawfareblog.com/2014/12/the-foreign-policyessay-wolves-who-are-lonely/]
the fear surrounding lone wolves is unwarranted and based on
ignorance of how they operate.
-actor terrorists tend to conform to
certain distinct patterns that can be useful in preventing attacks
lone wolves are not nearly as threatening as either their name or the
hype around them suggest.
But much of
My research shows that lone
future
. Perhaps more important, my
findings indicate that
Becker photoThe concern about lone-wolf terrorism pervades much of the U.S. national security establishment. President Obama, former Secretary of Homeland Security
Janet Napolitano, and current DHS Secretary Jeh Johnson, among others, have cited lone wolves as one of the gravest potential threats to U.S. security. They point to the rise of social media and terrorist propaganda, like the sophisticated videos produced by the
It is true that lone-wolf terrorism against
the United States has become more common in the past several years
Islamic State, and express concern that socially isolated individuals can become radicalized with troubling ease.
. And several lone-actor
attacks—including the 2011 shooting of Representative Gabrielle Giffords, which left six dead, and the 2009 Fort Hood shooting, which killed 13—have had deadly and tragic consequences. Concurrently, there has been little success in terms of identifying a lone wolf
“profile.” They can be young or old; black or white; radical Islamists, right-wing extremists, anti-Semites, militant environmentalists, or of another ideological persuasion altogether. Given the diversity of their backgrounds, how can such a protean enemy be
I recently undertook an analysis of 84 lone-wolf attacks that occurred in
the United States between 1940 and 2012 in an effort to identify patterns
First, similar to our recent experience
with the Ebola outbreak, the fear of the thing is usually worse than the thing
itself. Few lone-wolf attacks in the United States actually kill anyone, and
many others only succeed in killing one person the lone wolf himself
Many lone wolves are incompetent loners with no experience
discharging a bomb or firearm; oftentimes they exhibit behavior that, in
retrospect, is more bizarre and sad than frightening Take Dwight Watson,
a.k.a. the “Tractor Man.” In 2003, Watson drove his tractor to Washington,
D.C., and threatened to blow up explosives
After two days, he
surrendered unceremoniously and it was revealed that he never had any
weapons Part of the reason for the low casualty rate in lone-wolf attacks is
that unlike groups such al-Qaeda that have significant resources at their
disposal and, even more important, a sophisticated division of labor lone
wolves have to do all the work of terrorism themselves finding a target,
planning an attack, gathering supplies, doing reconnaissance, actually
carrying out the attack, and possibly executing an escape plan This
disadvantage is reflected in the weapons most lone wolves choose:
firearms. Globally
most terrorist attacks are bombings
a lone
gunman
likely to produce fewer fatalities
Another significant characteristic of lone wolves is their limited ability to
select meaningful targets The expertise needed to conduct a successful
attack on a hardened target—not an easy task—is reflected in the targets
most lone wolves choose and how they conduct themselves Lone wolves
countered?
in the
targets that lone wolves chose. I came away with several findings that have important national security implications.
:
(they are almost
invariably men).
.
near the National Mall.
at all.
,
—
.
, at the organizational level,
, but lone wolves mainly choose guns. In part,
this is because guns can more easily be attained than bombs in the United States, but lone wolves’ preference for firearms obtains globally as well, suggesting it is driven by their lack of facility with explosives. And
—while still potentially able to cause multiple casualties—is
than a well-made and well-placed bomb.
.
.
tend to choose unhardened, undefended targets
suspect that this tendency is due to two factors: the more
personal motives that—alongside their political ideologies—inform lone
wolves’ violent tendencies; and the desire to carry out a successful attack
The targets lone wolves choose tend to be congruent with the
ideologies that they say motivate them: so anti-abortion lone wolves
like college campuses, churches, and local government buildings. Only rarely do they opt for
significant or symbolic targets like the National Mall. I
, a task
made easier by choosing a softer target.
go after clinics or doctors
who perform abortions, while right-wing extremists target government buildings and officials. What is even more striking is that these small-ball targets tend to be found in or near places well known to perpetrators—the square in their hometown, the synagogue they
What should all these patterns mean to
counterterrorism officials? They indicate most notably that lone wolves are
not as fearsome as they are often made out to be. Lone wolves are only
rarely deadly. What is more, when they do manage to kill people, their
incompetence and reliance on firearms usually limit the number of deaths
concern about lone wolves is probably overblown,
Even if the threat were more severe, there
are too many potential targets and too many potential lone wolves to expect
law enforcement to monitor, detect, and interdict them all.
pass on their way to work, etc. Their daily routines, in other words, are usually the scene of the crime.
. As a
result, policymakers’
take account of this. In some sense, this requires us to learn to live with the existence of lone-wolf terrorism.
and the allocation of resources for counterterrorism purposes should
AT: ISIS
ISIS is structurally incapable of being a threat
Matthews and Preble 2015 (Dylan and Christopher [Cato's vice president for
defense and foreign policy studies]; Ignore the headlines. The world is getting safer all
the time.; Jan 15; www.vox.com/2015/1/14/7546165/world-getting-safer; kdf)
DM: Did ISIS change your thinking on this at all? ISIS fighter An ISIS fighter in Syria.
(AFP/Getty Images) CP: Not really, for a couple reasons. ISIS may be a terrorist
organization, and may be an insurgency, and may be a quasi-nation-state or
attempting to become a quasi-nation-state, but it's hard to be all of those things
simultaneously. Austin Long writes about this in his chapter, about the differences
between insurgents and terrorists. Most terrorists operate in the shadows. The hard part
is not killing them, it's finding them. That's why traditional counterterrorism is an
intelligence and information-gathering process. It's a lot like police work. By declaring
itself a state and raising a flag over territory it seizes and holds, ISIS is
trading away one of its key advantages, and opening itself up to more
traditional military attacks. It's a virulent, reprehensible state, but it's not clear
to me that it's a greater terrorist threat than other organizations that are
continuing to operate in the shadows.
Extra Cards
The perception of NSA overreach destroys law enforcement
cooperation – it’s a larger internal link to terrorism
Schulhofer, 13 – professor of law at NYU (Stephen, ““Making Sense of the NSA
Metadata Collection Program (Part II)”, 11/8, http://justsecurity.org/2985/makingsense-nsa-metadata-collection-program-part-ii/)
Efforts like the NSA sweeps actually undermine the counterterrorism effort
itself. The reason is that these types of programs generate profound mistrust
of government in general and of law enforcement in particular. We have already
seen dramatic examples in the way that the Snowden revelations of our spying on allies
has angered European leaders and endangered our working relationships with them.
Although this breach eventually will be healed, alienation and mistrust among ordinary
citizens is equally important, and it will not be so easily remedied. That mistrust, in
turn, has a strong chilling effect on the willingness of law-abiding, loyal
citizens to cooperate in the counterterrorism effort – for example by working
with officials in local counterterrorism programs or by alerting law enforcement to
various kinds of suspicious behavior. This dynamic has been demonstrated in
several decades of extensive law enforcement research, including research
focused specifically on counterterrorism policies and their impact on
Muslim communities in the West. In one study, for example, Muslim-Americans in
New York City were 61% less likely to report potentially suspicious precursors of
terrorism when they felt that counterterrorism policies were being unfairly set and
implemented. (See Schulhofer, Tyler & Huq, American Policing at a Crossroads:
Unsustainable Policies and the Procedural Justice Alternative, 101 J. Crim. L. &
Criminology 335, 364-74 (2011).)
This last point underscores the most important, but least appreciated, “given” of the
counterterrorism enterprise. Because the consequences of a terrorist attack could be so
catastrophic, citizens and public officials alike tend to support strong law enforcement
more readily than they do in ordinary times. The perception is that strong measures are
acceptable because the top priority must be to reduce the risk of attack. And strong
measures, whatever their drawbacks, at least seem to offer ways to reduce that risk. The
central lesson of smart law enforcement, however, is that there are no risk-free choices.
Strengthening the powers of the executive enhances some of our defenses
against terrorism, but it weakens others – many of which, including
community trust and cooperation, are absolutely essential to reducing the
dangers of terrorism.
Against this background, we must – for the sake of our democracy and even for the
sake of our physical security – find ways to dissipate the cloud of mistrust that
now hangs over NSA surveillance.
Mass surveillance causes information overload
Eddington, 15 - Patrick Eddington is a policy analyst in homeland security and civil
liberties at the Cato Institute. He was formerly a senior policy advisor to Rep. Rush Holt
(D-N.J.) and a military imagery analyst at the CIA’s National Photographic
Interpretation Center (“No, Mass Surveillance Won't Stop Terrorist Attacks” Reason,
1/27, http://reason.com/archives/2015/01/27/mass-surveillance-andterrorism#.ltrezi:U8Io
No, mass surveillance does not prevent terrorist attacks.
It’s worth remembering that the mass surveillance programs initiated by the U.S.
government after the 9/11 attacks—the legal ones and the constitutionally-dubious
ones—were premised on the belief that bin Laden’s hijacker-terrorists were
able to pull off the attacks because of a failure to collect enough data. Yet in
their subsequent reports on the attacks, the Congressional Joint Inquiry
(2002) and the 9/11 Commission found exactly the opposite. The data to
detect (and thus foil) the plots was in the U.S. government’s hands prior to the
attacks; the failures were ones of sharing, analysis, and dissemination. That
malady perfectly describes every intelligence failure from Pearl Harbor to
the present day.
The Office of the Director of National Intelligence (created by Congress in 2004) was
supposed to be the answer to the "failure-to-connect-the-dots" problem. Ten years on,
the problem remains, the IC bureaucracy is bigger than ever, and our
government is continuing to rely on mass surveillance programs that have
failed time and again to stop terrorists while simultaneously undermining the
civil liberties and personal privacy of every American. The quest to "collect it all," to
borrow a phrase from NSA Director Keith Alexander, only leads to the
accumulation of masses of useless information, making it harder to find
real threats and costing billions to store.
A recent Guardian editorial noted that such mass-surveillance myopia is spreading
among European political leaders as well, despite the fact that "terrorists, from 9/11 to
the Woolwich jihadists and the neo-Nazi Anders Breivik, have almost always come
to the authorities’ attention before murdering."
Mass surveillance is not only destructive of our liberties, its continued use is a
virtual guarantee of more lethal intelligence failures. And our continued will to
disbelieve those facts is a mental dodge we engage in at our peril.
Mass surveillance makes it less likely to detect terrorism –
overload,
Tufekci, 15 - Zeynep Tufekci is an assistant professor at the University of North
Carolina (“Terror and the limits of mass surveillance” Financial Times, 2/3,
http://blogs.ft.com/the-exchange/2015/02/03/zeynep-tufekci-terror-and-the-limits-ofmass-surveillance/
But the assertion that big data is “what it’s all about” when it comes to
predicting rare events is not supported by what we know about how these
methods work, and more importantly, don’t work. Analytics on massive datasets
can be powerful in analysing and identifying broad patterns, or events that occur
regularly and frequently, but are singularly unsuited to finding unpredictable,
erratic, and rare needles in huge haystacks. In fact, the bigger the haystack —
the more massive the scale and the wider the scope of the surveillance — the
less suited these methods are to finding such exceptional events, and the
more they may serve to direct resources and attention away from
appropriate tools and methods.
After Rigby was killed, GCHQ, Britain’s intelligence service, was criticised by many for
failing to stop his killers, Michael Adebolajo and Michael Adebowale. A lengthy
parliamentary inquiry was conducted, resulting in a 192-page report that lists all the
ways in which Adebolajo and Adebowale had brushes with data surveillance, but were
not flagged as two men who were about to kill a soldier on a London street. GCHQ
defended itself by saying that some of the crucial online exchanges had taken place on a
platform, believed to be Facebook, which had not alerted the agency about these men, or
the nature of their postings. The men apparently had numerous exchanges that were
extremist in nature, and their accounts were suspended repeatedly by the platform for
violating its terms of service.
“If only Facebook had turned over more data,” the thinking goes.
But that is misleading, and makes sense only with the benefit of hindsight. Seeking
larger volumes of data, such as asking Facebook to alert intelligence agencies every
time that it detects a post containing violence, would deluge the agencies with
multiple false leads that would lead to a data quagmire, rather than clues to
impending crimes.
For big data analytics to work, there needs to be a reliable connection
between the signal (posting of violent content) and the event (killing someone).
Otherwise, the signal is worse than useless. Millions of Facebook’s billionplus users post violent content every day, ranging from routinised movie violence
to atrocious violent rhetoric. Turning over the data from all such occurrences
would merely flood the agencies with “false positives” — erroneous indications
for events that actually will not happen. Such data overload is not without cost, as
it takes time and effort to sift through these millions of strands of hay to
confirm that they are, indeed, not needles — especially when we don’t even know
what needles look like. All that the investigators would have would be a lot of open leads
with no resolution, taking away resources from any real investigation. Besides, account
suspensions carried out by platforms like Facebook’s are haphazard, semi-automated
and unreliable indicators. The flagging system misses a lot more violent content
than it flags, and it often flags content as inappropriate even when it is not,
and suffers from many biases. Relying on such a haphazard system is not a
reasonable path at all.
So is all the hype around big data analytics unjustified? Yes and no. There are
appropriate use cases for which massive datasets are intensely useful, and perform
much better than any alternative we can imagine using conventional methods.
Successful examples include using Google searches to figure out drug interactions that
would be too complex and too numerous to analyse one clinical trial at a time, or using
social media to detect national-level swings in our mood (we are indeed happier on
Fridays than on Mondays).
In contrast, consider the “lone wolf” attacker who took hostages at, of all things, a “Lindt
Chocolat Café” in Sydney. Chocolate shops are not regular targets of political violence,
and random, crazed men attacking them is not a pattern on which we can base further
identification. Yes, the Sydney attacker claimed jihadi ideology and brought a black flag
with Islamic writing on it, but given the rarity of such events, it’s not always possible to
separate the jihadi rhetoric from issues of mental health — every era’s mentally ill are
affected by the cultural patterns around them. This isn’t a job for big data analytics. (The
fact that the gunman was on bail facing various charges and was known for sending hate
letters to the families of Australian soldiers killed overseas suggests it was a job for
traditional policing).
When confronted with their failures in predicting those rare acts of domestic terrorism,
here’s what GCHQ, and indeed the NSA, should have said instead of asking for
increased surveillance capabilities: stop asking us to collect more and more data to
perform an impossible task. This glut of data is making our job harder, not
easier, and the expectation that there will never be such incidents, ever, is not realistic.
Attention should instead be focused on the causal chain that led the Kouachi brothers
on their path. It seems that the French-born duo had an alienated, turbulent youth, and
then spent years in French prisons, where they were transformed from confused and
incompetent wannabe jihadis to hardliners who were both committed and a lot more
capable of carrying out complex violence acts than when they entered the prison.
Understanding such paths will almost certainly be more productive for preventing such
events, and will also spare all of us from another real danger: governments that know
too much about their citizens, and a misguided belief in what big data can do to find
needles in too-large haystacks.
Significant surveillance reform now disproves the link
Edgar, 4/13/15 - visiting fellow at the Institute and adjunct professor of law at the
Georgetown University Law Center (Timothy, “The Good News About Spying”
https://www.foreignaffairs.com/articles/united-states/2015-04-13/good-news-aboutspying
Despite high hopes for a fresh start on civil liberties, during his first term in office,
Obama ratified and even expanded the surveillance programs that began under former
President George W. Bush. After NSA contractor Edward Snowden began revealing
the agency’s spying programs to The Guardian in 2013, however, Obama responded
with a clear change of direction. Without great fanfare, his administration has made
changes that open up the practices of the United States intelligence
community and protect privacy in the United States and beyond. The last year
and a half has been the most significant period of reform for national
security surveillance since Senator Frank Church led the charge against domestic
spying in the late 1970s.
In 2013, at Obama’s direction, the Office of the Director of National Intelligence (ODNI)
established a website for the intelligence community, IC on the Record, where
previously secret documents are posted for all to see. These are not decades-old files
about Cold War spying, but recent slides used at recent NSA training sessions, accounts
of illegal wiretapping after the 9/11 attacks, and what had been highly classified
opinions issued by the Foreign Intelligence Surveillance Court about ongoing
surveillance programs.
Although many assume that all public knowledge of NSA spying programs came from
Snowden’s leaks, many of the revelations in fact came from IC on the Record, including
mistakes that led to the unconstitutional collection of U.S. citizens’ emails. Documents
released though this portal total more than 4,500 pages—surpassing even the 3,710
pages collected and leaked by Snowden. The Obama administration has instituted other
mechanisms, such as an annual surveillance transparency report, that will continue to
provide fodder for journalists, privacy activists, and researchers.
The transparency reforms may seem trivial to some. From the perspective of
an intelligence community steeped in the need to protect sources and methods,
however, they are deeply unsettling. At a Brown University forum, ODNI Civil
Liberties Protection Officer Alexander Joel said, “The intelligence community is not
designed and built for transparency. Our culture is around finding our adversaries’
secrets and keeping our own secrets secret.” Accordingly, until only a few years ago, the
intelligence community resisted making even the most basic information public. The
number of FISA court opinions released to the public between 1978 and 2013 can be
counted on one hand.
Beyond more transparency, Obama has also changed the rules for
surveillance of foreigners. Until last year, privacy rules applied only to “U.S.
persons.” But in January 2014, Obama issued Presidential Policy Directive
28 (PPD-28), ordering intelligence agencies to write detailed rules assuring
that privacy protections would apply regardless of nationality. These rules,
which came out in January 2015, mark the first set of guidelines for
intelligence agencies ordered by a U.S. president—or any world leader—that
explicitly protect foreign citizens’ personal information in the course of
intelligence operations. Under the directive, the NSA can keep personal information in
its databases for no more than five years. It must delete personal information from the
intelligence reports it provides its customers unless that person’s identity is necessary to
understand foreign intelligence—a basic rule once reserved only for Americans.
The new rules also include restrictions on bulk collection of signals
intelligence worldwide—the practice critics call “mass surveillance.” The
NSA’s bulk collection programs may no longer be used for uncovering all types of
diplomatic secrets, but will now be limited to six specific categories of serious national
security threats. Finally, agencies are no longer allowed simply to “collect it all.” Under
PPD-28, the NSA and other agencies may collect signals intelligence only after weighing
the benefits against the risks to privacy or civil liberties, and they must now consider the
privacy of everyone, not just U.S. citizens. This is the first time any U.S. government
official will be able to cite a written presidential directive to object to an intelligence
program on the basis that the intelligence it produces is not worth the costs to privacy of
innocent foreign citizens.
No data proves surveillance reduces terrorism risks
Kehl, 14 – Policy Analyst at New America’s Open Technology Institute (Danielle,
“Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom &
Cybersecurity” July, https://www.newamerica.org/oti/surveillance-costs-the-nsasimpact-on-the-economy-internet-freedom-cybersecurity/
So far, the purported benefits of the programs remain unsubstantiated. While
intelligence officials and representatives of the Obama Administration have
defended the merits of the NSA programs,18 they have offered little hard evidence
to prove their value. To the contrary, initial analyses of the NSA’s bulk records
collection program suggest that its benefits are dubious at best, particularly compared to
the program’s vast breadth. A January 2014 study from the New America
Foundation’s International Security Program, for example, concluded that “the
government’s claims about the role that NSA ‘bulk’ surveillance of phone
and email communications records has had in keeping the United States safe from
terrorism… are overblown and even misleading.”19 Similarly, in its review of the
telephone records collection program under Section 215 of the USA PATRIOT Act, the
Privacy and Civil Liberties Oversight Board (PCLOB) could not identify a single
instance in which the telephone records program made a concrete
difference in the outcome of a counterterrorism investigation.20 The
President’s Review Group concurred, emphasizing that “there is always a
possibility that acquisition of more information—whether in the US or abroad—might
ultimately prove helpful. But that abstract possibility does not, by itself, provide
a sufficient justification for acquiring more information.”21 Although the
PCLOB did find in a separate report that “the information the [Section 702] program
collects has been valuable and effective in protecting the nation’s security and producing
useful foreign intelligence,”22 it provided no details and did not weigh those purported
benefits against the various costs of the surveillance. Furthermore, its conclusions were
undermined just days later when The Washington Post revealed that nine out of
ten of the Internet users swept up in the NSA’s Section 702 surveillance are
not legally targeted foreigners.23
Current counter-terrorism fails – lack of human intelligence
outweighs
Eddington, 15 - Patrick G. Eggerton worked as a military imagery analyst at the CIA.
He is policy analyst in homeland security and civil liberties at Cato Institute. (Patrick,
“US wants to hack your phone because it doesn’t have real spies it needs” Reuters,
http://blogs.reuters.com/great-debate/2015/02/23/the-fbi-was-for-encryption-beforeit-was-against-it/
The best way to disrupt any organized criminal element is to get inside of it
physically. But the U.S. government’s counterterrorism policies have made
that next to impossible.
The FBI, for example, targets the very Arab-American and Muslim-American
communities it needs to work with if it hopes to find and neutralize homegrown violent extremists, including promulgating new rules on profiling that allow
for the potential mapping of Arab- or Muslim-American communities. The Justice
Department’s refusal to investigate the New York Police Department’s mass surveillance
and questionable informant-recruitment tactics among immigrants in the Arab- and
Muslim-American communities has only made matters worse.
Overseas, the Cold War style of spying — relying on U.S. embassies as bases from which
CIA and other U.S. government intelligence personnel operate — is increasingly difficult
in the areas of the Middle East and southwest Asia undergoing often violent political
change.
Steinbach testified about this before the House Homeland Security Committee earlier
this month. “The concern is in Syria,” he explained, “the lack of our footprint on the
ground in Syria — that the databases won’t have the information we need.”
Notice his reference to technology “databases” rather than the importance of the human
element. The U.S. intelligence community’s emphasis should be on the spy on
the ground who actually gathers critical information and makes any
penetration of a terrorist organization possible.
This problem is true for Yemen as well, as a recent Washington Post story highlighted:
The spy agency has pulled dozens of operatives, analysts and other staffers from Yemen
as part of a broader extraction of roughly 200 Americans who had been based at the
embassy in Sana, officials said. Among those removed were senior officers who worked
closely with Yemen’s intelligence and security services to target al-Qaeda operatives and
disrupt terrorism plots often aimed at the United States.
The CIA’s failure to field agents under nonofficial cover, or to recruit
enough reliable local informants on the ground who could communicate securely
with CIA handlers outside Yemen, is symptomatic of the agency’s failure to
break with its reliance on embassy-based operations throughout that part of
the world. Compromising encryption technology will do nothing to solve the
intelligence community’s human-intelligence deficit. This is a problem the
agency must address if it is ever going to be successful in finding and neutralizing
terrorist cells overseas.
It boils down to the fact that the FBI and the U.S. intelligence community have
failed to adapt their intelligence-collection practices and operations to meet the
challenges of the “new world disorder” in which we live. As former CIA officer Philip
Giraldi has noted:
[I]ntelligence agencies that were created to oppose and penetrate other nation-state
adversaries are not necessarily well equipped to go after terrorists, particularly when
those groups are ethnically cohesive or recruited through family and tribal vetting, and
able to operate in a low-tech fashion to negate the advantages that advanced
technologies provide.
The CIA has repeatedly attempted — occasionally at high cost — to penetrate militant
organizations like al Qaeda and Islamic State. Nonetheless, Washington’s overall
counterterrorism bias in funding and manpower has been toward using the
most sophisticated technology available as the key means of battling a
relatively low-tech enemy.
The FBI’s new anti-encryption campaign is just the latest phase in the government’s
attempt to deny Islamic State and related groups the ability to shield their
communications. If these militant groups were traditional nation-states with their own
dedicated communications channels, we’d all be cheering on the FBI’s efforts. But the
Internet has become the primary means for global, real-time communications for
individuals, nonprofits, businesses and governments. So it should not be treated as just
another intelligence target, which is certainly the FBI’s and Natural Security Agency’s
current mindset.
Using the legislative process to force companies to make defective electronic devices
with exploitable communications channels in the hope that they will catch a tiny
number of potential or actual terrorists is a self-defeating strategy. If implemented, the
FBI’s proposal would only make all Americans more vulnerable to
malicious actors online and do nothing to stop the next terrorist attack.
The government greatly exaggerates PRISM’s ability to stop
terrorism
Sanchez, 13 – senior fellow on technology, privacy and national security and
intelligence surveillance at Cato (Julian, “Epstein on NSA (Again) Part I: PRISM & the
FISA Amendments Act” 6/28, http://www.cato.org/blog/epstein-nsa-again-part-iprism-fisa-amendments-act
Finally, Epstein and Loyola rather uncritically repeat the claim that the
PRISM program surveillance pursuant to FAA authorities “is responsible for
foiling about 40 of the 50 terrorist plots which the administration recently
disclosed to Congress in classified briefings.” If we scrutinize the government’s claims a
bit more closely, we see that in fact NSA Director Keith Alexander claimed that PRISM
intercepts had “contributed” to the disruption of 40 of 50 terrorist “events,” mostly
overseas, and judged this contribution to have been “critical” in 50 percent of these
cases.
When we examine some of the specific “events” government officials have
discussed, however, it becomes clear that not all of these are “plots” at all—
many seem to have involved funding or other forms of “material support” for radical
groups, though in at least one such case the government appears to have claimed a
“plot” to bomb the New York Stock Exchange where none really existed. (FBI Deputy
Sean Joyce further told Congress that the “plot” must have been serious given that a jury
convicted the plotters. But federal prosecutors themselves emphasized that the men
“had not been involved in an active plot” and there was no jury trial: they were charged
with “material support” and pled guilty.)
Presumably at least some of these “events” did involve actual planned attacks, but
knowing that PRISM surveillance was “critical” to disrupting half of them
doesn’t in itself tell us much. The question is whether the same surveillance
could have been conducted in these cases using authorities that existed
before the FISA Amendments Act, or under narrower amendments to FISA. Since
the bulk of these “events” appear to have been overseas, the traditional
authority to intercept purely foreign communications without a warrant
would seem to have sufficed, or at most required a legal tweak to
accommodate stored data on U.S. servers used by foreigners to
communicate with other foreigners. There is no evidence to suggest that the
actually controversial part of the FAA—the revocation of the warrant
requirement for interception of U.S.-to-foreign wire communications—
made a necessary contribution in these cases. Indeed, as national security expert
Peter Bergen has documented, the public record in the overwhelming majority
of terror plots we know about shows that they were “uncovered by
traditional law enforcement methods, such as the use of informants, reliance on
community tips about suspicious activity and other standard policing practices.”
There is certainly such a thing as too much skepticism about government. But when
officials make vague allusions to vital, secret successes in an effort to justify their own
broad powers, there is also such a thing as too much credulity.
So much for PRISM and the FISA Amendments Act. I’ll discuss what Epstein and Loyola
say about the NSA’s metadata dragnet in a separate post.
Politics DA
Obama won’t push
Obama loves PRISM, would never use pc against it
Finn and Nakashima 13 ---Ellen Nakashima is a national security reporter for The Washington Post, Peter Finn
is
national security editor of The Washington Post (“Obama defends sweeping surveillance efforts,” 6/7/13,
http://www.washingtonpost.com/politics/obama-defends-sweeping-surveillance-efforts/2013/06/07/2002290a-cf88-11e2-9f1a1a7cdee20287_story.html)//LE
President Obama on Friday defended the government’s collection of data on the phone
records of millions of Americans, saying that it was a modest encroachment on privacy
and one he thinks is both lawful and justified in order to identify terrorists plotting to
attack the United States.
Obama emphasized that the government does not collect information on individual callers or eavesdrop on Americans’
conversations without a warrant. He said he would welcome a debate on the classified surveillance effort as well as the previously
secret workings of a second program that gathers the e-mails and other digital content of targeted foreigners outside the United
States from major American Internet companies.
The programs “make a difference in our capacity to anticipate and prevent possible
terrorist activity,” Obama said.
Revelations about the programs in The Washington Post and the Guardian newspaper have opened up a debate that previously had
been limited to the cryptic warnings of some members of Congress who were briefed on but troubled by the surveillance efforts.
Some lawmakers who do not serve on the intelligence committees said they had no knowledge of the programs.
“Did I know about it? No, I didn’t,” said Rep. Gerald E. Connolly (D-Va.), who said he was unconvinced by the president’s assurances
that surveillance efforts are constrained by congressional oversight and the federal courts. “That’s the lawyer in him speaking. . . .
The way bureaucracies work, we stumble into invasions of privacy. We want information it’s unwise to seek or to possess.”
The National Security Agency acknowledges that Americans’ communications can be inadvertently collected, but U.S. intelligence
agencies have declined to provide Congress with an estimate on how often that has happened, despite repeated requests for that
information.
In his remarks, Obama said it was “healthy for our democracy” to have an open discussion about the balance between privacy and
security concerns but also said he rued the leaks of classified information that prompted the current debate.
“If every step that we’re taking to try to prevent a terrorist act is on the front page of the
newspapers or on television, then presumably the people who are trying to do us harm
are going to be able to get around our preventive measures,” Obama said during an
event in Northern California. “That’s why these things are classified. But that’s also why
we’ve set up congressional oversight. These are the folks you all vote for as your
representatives in Congress, and they’re being fully briefed on these programs.”
The Obama administration has aggressively pursued leak investigations. In one case, it swept up the phone records of Associated
Press journalists; in another, it identified a Fox News journalist as a “co-conspirator” for soliciting classified information.
The career intelligence officer who disclosed details of the online data-mining program to The Post said he acted out of a sense that
the NSA has exceeded the privacy expectations of Americans. The source thinks he is likely to be exposed and is prepared for that
possibility. One Justice official, speaking on the condition of anonymity, said that the department is at “the start of the process” of
determining if an investigation of the leaks is appropriate.
The Guardian also reported Friday that GCHQ, Britain’s equivalent of the NSA, has been secretly gathering intelligence from the
same Internet companies through an operation set up by the NSA.
According to documents obtained by the Guardian, the program would appear to allow GCHQ to circumvent the formal legal process
required in Britain to seek personal material such as -e-mails, photos and videos from an Internet company based outside of the
country.
Several companies contacted by The Post said they did not allow direct government access to their servers and said that they
responded only to court-sanctioned requests for information. Government officials also stressed that any information obtained is
targeted and backed by law and the courts. The program was authorized in 2008 when Congress passed the FISA Amendments Act.
On Friday, Obama emphasized that both of the newly disclosed surveillance programs
“have been authorized by broad, bipartisan majorities repeatedly since 2006. . . . It’s
important to understand that your duly elected representatives have been consistently
informed on exactly what we’re doing.”
Obama defends PRISM
BBC News 13--- operational business division of the British Broadcasting Corporation responsible for the gathering and
broadcasting of news and current affairs (“Barack Obama defends U.S. surveillance tactics,” 6/8/13,
http://www.bbc.com/news/world-us-canada-22820711)//LE
President Barack Obama has defended newly revealed US government phone and
internet surveillance programmes, saying they are closely overseen by Congress and the
courts.
Mr Obama said his administration had struck "the right balance" between security and
privacy.
He also stressed US internet communications of US citizens and residents were not
targeted.
And he tried to reassure the US "nobody is listening to your phone calls".
Mr Obama was commenting on revelations this week in the Guardian and Washington Post newspapers that the US National
Security Agency (NSA) was collecting or tapping into vast amounts of telephone and internet communications data.
On Wednesday night, the UK's Guardian newspaper reported a secret court had ordered phone company Verizon to hand over to the
NSA millions of records on telephone call "metadata".
That report was followed by revelations in both the Washington Post and Guardian that the NSA tapped directly into the servers of
nine internet firms including Facebook, Google, Microsoft and Yahoo to track online communication in a programme known as
Prism.
Mark Zuckerberg, founder of Facebook, said the press reports were "outrageous" and denied Facebook's participation in the
programme.
His statement echoed those of other internet companies, who said they had not given the government direct access to their servers.
Mr Zuckerberg said: "We have never received a blanket request or court order from any government agency asking for information
or metadata in bulk, like the one Verizon reportedly received.
"And if we did, we would fight it aggressively. We hadn't even heard of Prism before yesterday."
And on Friday, the Guardian reported that the UK's electronic surveillance agency, GCHQ, had been able to see user
communications data from the American internet companies, because it had access to Prism.
The Guardian reported that GCHQ had access to the system since June 2010 and information from Prism had contributed to 197
British intelligence reports last year.
In California on Friday, Mr Obama noted both NSA programmes had been authorised
repeatedly by Congress and were subject to continual oversight by congressional
intelligence committees and by secret intelligence courts.
The president said he had come into office with a "healthy skepticism" of both
programmes, but after evaluating them and establishing further safeguards, he decided
"it was worth it".
"You can't have 100% security, and also then have 100% privacy and zero inconvenience," Mr Obama said.
Acknowledging "some trade-offs involved", he said, "We're going to have to make some choices."
Senior US Senator Dianne Feinstein confirmed on Thursday that the Verizon phone records order published by the Guardian was a
three-month extension of an ongoing request to Verizon. Intelligence analysts say there are likely similar orders for other major
communications firms.
The data requested includes telephone numbers, calling card numbers, the serial numbers of phones used and the time and duration
of calls. It does not include the content of a call or the callers' addresses or financial information.
'Assault on Constitution'
Prism was reportedly developed in 2007 out of a programme of domestic surveillance without warrants that was set up by President
George W Bush after the 9/11 attacks.
Lobbyists
Tech and telecom companies spend millions influencing
Congress
Rosenberg 14 --- executive editor of The Fiscal Times, where he oversees coverage of business, the economy, technology
and Wall Street (“Google Spends More Than Any Other Tech Giant to Influence Congress,” Yuval,
http://www.thefiscaltimes.com/2014/10/23/Google-Spends-More-Any-Other-Tech-Giant-InfluenceCongress#sthash.reCAdJBf.dpuf)//LE
Silicon Valley keeps playing the D.C. game. Tech and telecom giants including Google
and Facebook spent millions on political lobbying in the three-month period from July
to September, according to data released Tuesday.
Google spent nearly $4 million on its efforts to win favor with lawmakers, up 17 percent
over the same period last year (but down from roughly $5.3 million last quarter).
Among major tech-related companies only Comcast spent more last quarter. The cable
giant, of course, is trying to win approval for its $45 billion mega merger with Time
Warner Cable.
Over the first nine months of 2014, though, Google has spent $13 million on lobbying,
more than any other tech company. Comcast, by comparison, has spent about $11.8
million, AT&T has doled out roughly $11 million, and Facebook has spent $7.35 million.
Google’s ramped up spending over the last quarter relative to the same period in 2013
makes it a bit of an outlier in the tech sector. Nine of the 15 tech companies monitored
by Consumer Watchdog, an advocacy group, dialed back their lobbying spending last
quarter compared to the third quarter of 2013. Facebook was among the six that
increased their lobbying efforts, upping third-quarter spending 70 percent, from $1.44
million last year to $2.45 million this year. Amazon’s lobbying bill, at $1.18 million,
reached seven figures in a quarter for just the second time, as the retailer upped thirdquarter lobbying by 51 percent over 2013.
What are the tech giants buying with that money? “Businesses don’t spend big bucks
unless they think that they’re going to get something for it,” says John M. Simpson of
Consumer Watchdog “Sometimes it’s as much about what isn’t being passed as what is
being passed.”
Google’s most recent filing indicates it has lobbied politicians on a host of issues, from
cybersecurity and privacy issues to intellectual property enforcement and patent law. It
has also lobbied lawmakers on trade agreements like the Trans-Pacific Partnership,
international tax reform, immigration policies, wind power, health IT and data policies,
and “unmanned aerial vehicle technology,” or drones.
Lobbyists love the plan---Freedom Act proves
Gibbs 14 ---
a technology reporter covering consumer electronics, security, privacy and all things tech (Samuel, “Facebook,
Google and Apple lobby for curb to NSA surveillance,” 11/17/14, http://www.theguardian.com/technology/2014/nov/17/facebookgoogle-apple-lobby-senate-nsa-surveillance)//LE
A coalition of technology and internet companies is lobbying to curb US National
Security Agency surveillance powers and for more transparency on government data
requests.
The Reform Government Surveillance coalition, including Facebook, Google, Twitter,
Microsoft and Apple, added its support for the race to pass a bill through the US Senate
before the end of the year, which would inhibit mass data collection from emails and
internet metadata.
“The Senate has an opportunity this week to vote on the bipartisan USA Freedom Act,” said the coalition in an open letter sent to the
Senate. “We urge you to pass the bill, which both protects national security and reaffirms America’s commitment to the freedoms we
all cherish.”
The bill would also allow technology companies to disclose the number and types of data demands from government as part of the
continued transparency push from the industry.
If the USA Freedom Act fails to pass through the Senate before the end of the year the process will have to restart in January, and
will be scrutinised by a new Congress controlled a Republican party more favourable to government surveillance.
The USA Freedom Act was passed through the House of Representatives in May with bipartisan support and is now set for a vote in
the Senate after Nevada Democrat and Senate majority leader Harry Reid filed a procedural motion to have the bill heard.
Privacy advocates and technology groups championed the bill originally but many revoked their support after compromises
expanded the definition of what data the government can collect.
The Senate vote on 18 November will allow debate on amendments to begin on the bill, although whether enough senators will vote
in favour is unknown.
Gary Shapiro, chief executive of the Consumer Electronics Association, which represents hundreds of technology companies globally
and hosts the largest electronics trade show in the world International CES, wrote an open letter urging support for the bill.
“American technology companies have been hurt by reaction to the revelation of the US
government’s bulk data collection,” wrote Shapiro. “Many companies have lost business,
or face laws designed to restrict data flows, due to foreign governments’ fear that the US
government can reach company-managed data at will.”
“Several companies, including members of CEA, have already lost contracts with foreign
governments worth millions of dollars. Further, several governments may now limit the
free flow of data across borders, damaging the utility and functionality of the internet,”
he wrote.
Technology companies, including Apple and Google, retaliated to the NSA revelations by
implementing end-to-end encryption and enhancing security on mobile devices,
protecting personal data as standard.
Pushback from technology companies, including Microsoft and Facebook, saw a limited
transparency deal struck with the US Justice Department in February, which the new
bill will enhance allowing companies greater freedom to disclose security requests for
user data.
The Reform Government Surveillance coalition also recommitted to reforms beyond the
USA Freedom Act, describing it only as a step in the right direction.
“We will continue to work with Congress, the Administration, civil liberties groups and
governments around the world to advance essential reforms that we set forth in a set of
principles last year,” wrote the coalition. “Such reforms include: preventing government
access to data without proper legal process; assuring that providers are not required to
locate infrastructure within a country’s border; promoting the free flow of data across
borders; and avoiding conflicts among nations through robust, principled, and
transparent frameworks that govern lawful requests for data across jurisdictions.”
Supreme court
Supreme court solves and avoids link to ptx---Metadata proves
De Vogue 5/7/15 ---CNN Supreme Court Reporter (“Court rules NSA program illegal,” Ariane,
http://www.cnn.com/2015/05/07/politics/nsa-telephone-metadata-illegal-court/)//LE
Washington (CNN)A federal appeals court ruled on Thursday that the telephone
metadata collection program, under which the National Security Agency gathers up
millions of phone records on an ongoing daily basis, is illegal under the Patriot Act.
The government has argued it has the power to carry forward with the program under a
section of the Patriot Act, which expires in June. Lawmakers are locked in a debate on
whether or how to renew the authority, which was first passed shortly after the Sept. 11,
2001 terror attacks on New York and Washington, but has been renewed by both
Presidents Bush and Obama in the intervening years.
Documents confirming the program's existence were first revealed in June of 2013 with
the leaks by former government contractor Edward Snowden.
Cross apply evidence saying PRISM violates 4th amendment from <<insert author name
here>>
Supreme court can rule that PRISM cannot collect domestic data and that it can only
collect foreign data through PPD28
AT: Implementation specification bad
Implementation specification good bc it means we are researching the topic more--good for education
Scenario two is TPP collapse
If the US wants to ink a trade deal, it needs to alleviate fears of NSA spying
Motherboard ’14. “The World's Next Major Trade Agreement Will Make NSA Spying
Even Easier” July 16, 2014. Justin Ling. http://motherboard.vice.com/read/the-transpacific-partnership-will-make-nsa-spying-easier //JJ
With paranoia over NSA surveillance reaching a fever pitch, foreign
governments are making a reasonable plea: bring our data home. But the
Americans are doing their best to ensure that the world’s Internet data
stays on U.S. soil, well within the reach of their spies. To do so, American
negotiators are leveraging trade deals with much of the developed world,
inserting language to ensure “cross-border data flows”—a euphemism that
actually means they want to inhibit foreign governments from keeping data hosted
domestically. The trade deals they’re influencing—the Trans-Atlantic
Partnership (TPP), the Trade in Services Agreement (TiSA), and the
Transatlantic Trade and Investment Partnership (TTIP)—are all so
secretive that nobody but the governments themselves are privy to the
details. But thanks to the Australians and Wikileaks, both of whom have leaked details
on TPP, we have a pretty good idea of what’s going on in the latest Trans-Pacific
Partnership—a trade agreement that will act as a sort of NAFTA for Asia-Pacific region
nations. America is, essentially, the world’s data server. Since the dawn of
the internet itself, every database of import has been hosted in the grand US
of A. But now, foreign governments are starting to see the benefit of
patriating their citizens’ private information. Canada was an early adopter of the
idea. Federal procurement regulations often require government departments to insert
local data requirements, stating that businesses who wish to administer or host
Canadians’ information must keep the information within Canadian borders. Most
recently, the Canadian Government put out a tender for a company to merge and host
the email servers for all their departments. In doing so, they stuck in a national security
exemption, forbidding foreign contractors from applying. Nova Scotia and British
Columbia went a step further, flatly requiring any government-hosted personal data to
be physically located in Canada. Australia has taken similar steps, including setting up
firm requirements for how companies store offshore data. But the American
government is not having any of it and is using TPP negotiations to strongarm new provisions that favour American hosted data. “In today’s informationbased economy, particularly where a broad range of services are moving to ‘cloud’ based
delivery where U.S. firms are market leaders; this law hinders U.S. exports of
a wide array of products and services,” reads a report on Canada from the office of
the United States trade commissioner. The only reason the world is aware of the
provisions in TPP on data hosting, is because the Australian negotiators,
facing American insistence on the matter, leaked it to the press. Along with
the New Zealanders, the Aussies are proposing changes to the agreement to short-circuit
America’s proposal. The TPP negotiations are top-secret, and highly controversial. As
VICE reported earlier this month, provisions of the agreement could force American
anti-piracy provisions onto the signatory countries. “We know there is an ecommerce chapter and the general understanding is that the U.S. is
pressing for a provision that would bar the ability to require localization of
data,” says University of Ottawa professor Michael Geist, who is also the Canada
Research Chair in Internet and E-commerce Law. “That has big implications.” The
Americans aren’t even making secret their insistence on the matter. On the American
website for the trade deal, it clearly states there’s a priority for the TPP to
include: “requirements that support a single, global Internet, including
ensuring cross-border data flows, consistent with governments’ legitimate
interest in regulating for purposes of privacy protection.”
TPP and global trade agreements are key to the economy and
countering China
Frum – June 12, 2015. (David Frum former presidential speech writer and a
journalist for the Atlantic Magazine. “Why Americans Are Turning Against Free Trade”
The Atlantic. http://www.theatlantic.com/politics/archive/2015/06/-tpp-tpadefeated/395792/ //JJ
A decade and a half ago, I filled my days writing speeches urging Congress to grant
President George W. Bush fast-track trade authority. If memory serves, I wrote more
speeches on that one subject than on any other. Obviously, I didn’t earn my pay: Despite
Republican majorities in both Houses, Congress balked. This past year, President
Obama has worked as hard for fast-track authority as President Bush ever did. It now
seems that his efforts will prove as unavailing. This time, if anything, the loss is even
more heartbreaking, because the prize in reach is bigger than anything on offer in 20012002: a Trans-Pacific Partnership on trade. TPP matters both to the American
economy and to American security. China’s admission to the World Trade
Organization in 2001 was necessary and unavoidable. How can you sustain
a multilateral-trade regime without including the world’s largest exporter
and second-largest importer? But the price of China’s inclusion in the WTO
was the paralysis of the multilateral trade regime that had evolved since the
1940s: Trade-liberalization negotiations that included China just became too difficult.
The Trans-Pacific Partnership tries to work around China’s obstructionism
by limiting the next round of trade liberalization to 11 highly congenial
countries: Australia, Brunei, Canada, Chile, Japan, Malaysia, Mexico, New
Zealand, Peru, Singapore, the United States, and Vietnam. Not all are liberal
democracies, but all are committed to a more open global-trading regime. Even more
than the U.S.-Canada trade agreement of 1988, which was widened to include Mexico in
1994, TPP is intended to be an “open architecture” agreement, to which
other countries can adhere in future if they so wish. In other words, while the
door is open to China, the house is being built to non-Chinese specifications and without
China’s veto. Since the TPP states together represent not only 40 percent of the
world economy, but also many of China’s largest trade partners, the
agreement will constrain China’s future trade behavior. TPP thus asserts
Western and American will and power against an often-recalcitrant China.
TPP also will accelerate economic growth among the member nations. The importance
of trade to the U.S. economy can be oversold—in my speech writing days, I was surely
guilty of this to some degree—but by any definition, it’s significant and becoming more
so. The slowdown in developed world growth since the late 1990s has many causes
beyond the stall in trade liberalization. But the stall in trade liberalization has not
helped. The natural tendency of democratic societies is gradually to accumulate barriers
to international trade. The Bush administration itself exemplified this: At the same time
as it pleaded for fast-trade authority, it imposed restrictions on foreign steel. Relentless
international action on trade liberalization offsets equally relentless domestic pressure
for trade protection. Freer trade is always a tough vote. As long ago as the 1960s, Barry
Goldwater tried to make a campaign issue out of John F. Kennedy’s allegedly excessive
trade liberalization. Yet from the 1940s through the 1990s, freer trade benefited from
the almost unanimous elite consensus in its favor—and the strong public instinct to
defer to elites when unanimous. That deference has eroded. A recent Pew Research
poll found that although 58 percent of Americans felt that free trade
benefits the national economy, just 43 percent thought such deals benefited
their own families finances. And pluralities of Americans believe that free trade
slows economic growth, lowers wages, and leads to job losses. These are responses that
cause economists to roll their eyes. But most of us aren’t economists. We know what we
experience—and what most Americans have experienced are many more foreign
products on their shelves, a half-decade of weak job growth for Americans, and
stagnating or declining living standards for all but the wealthiest. Economic and
political leaders can argue that the nation’s economic troubles are not
traceable to free trade—that Americans would have been even worse off if
they reverted to protectionism. The trouble is that Americans no longer trust their
leaders. If polls can be relied upon, trust in leaders and institutions has plunged to the
lowest levels ever recorded, lower even than during the dismal days of the mid-1970s.
The belief that the economic system is rigged in favor of the wealthy and that ordinary
people can no longer get ahead run is especially intense. Americans increasingly
perceive the rich getting richer, the poor getting poorer. Their view of business
corporations has turned especially hostile, very nearly as hostile as their view of
government. Trade is a pro-growth policy. But when the proceeds of growth are not
widely shared, and not perceived as widely shared, it becomes difficult to sustain the
consensus in favor of pro-growth measures—especially when those measures seem to
impose costs on American workers. That’s the warning in today’s congressional action.
[Insert impact Sequence]
Loss of US economic leadership causes extinction
Lieberthal and O’Hanlon 12 - *Director of the John L. Thornton China Center at Brookings AND Director of
Research and Senior Fellow Foreign Policy (Kenneth and Michael, “The Real National Security Threat: America's Debt”, The
Brookings Institute, 7/10,http://www.brookings.edu/research/opinions/2012/07/10-economy-foreign-policy-lieberthal-ohanlon)
EL
Lastly, American
economic weakness undercuts U.S. leadership abroad. Other countries
sense our weakness and wonder about our purported decline. If this perception becomes
more widespread, and the case that we are in decline becomes more persuasive, countries
will begin to take actions that reflect their skepticism about America's future. Allies and friends will
doubt our commitment and may pursue nuclear weapons for their own security, for example;
adversaries will sense opportunity and be less restrained in throwing around their weight in their
own neighborhoods. The crucial Persian Gulf and Western Pacific regions will likely become
less stable. Major war will become more likely.
US China war means extinction
Wittner, 11 – professor of history emeritus at SUNY Albany(Lawrence, “Is A Nuclear
War with China Possible?”, Huffington Post, 11/30,
http://www.huffingtonpost.com/lawrence-wittner/nuclear-warchina_b_1116556.html)//VP
Surely the United States would "win" any nuclear
war with China. But what would that "victory" entail? An attack
with these Chinese nuclear weapons would immediately slaughter at least 10 million Americans in a great
storm of blast and fire, while leaving many more dying horribly of sickness and radiation poisoning. The Chinese death toll in a
nuclear war would be far higher. Both nations would be reduced to smoldering, radioactive wastelands.
Also, radioactive debris sent aloft by the nuclear explosions would blot out the sun and bring on a "nuclear
winter" around the globe -- destroying agriculture, creating worldwide famine, and generating chaos and destruction.
Reform bipart
NSA reform bipart---Freedom Act proves
Lewis and Roberts 13--- Paul Lewis is Washington correspondent for the Guardian. He was previously special
projects editor, Dan Roberts is the Guardian's Washington Bureau chief, covering politics and US national affairs (“NSA reform bill
to trim back US surveillance unveiled in Congress,” 9/25/13, http://www.theguardian.com/world/2013/sep/25/nsa-reform-billsurveillance-congress)//LE
Four senators at the vanguard of bipartisan efforts to rein in US government spying
programs announced the most comprehensive package of surveillance reforms so far
presented on Capitol Hill on Wednesday.
The draft bill represented the first sign that key Republican and Democratic figures in
the Senate are beginning to coalesce around a raft of proposals to roll back the powers of
the National Security Agency in the wake of top-secret disclosures made by
whistleblower Edward Snowden.
"The disclosures over the last 100 days have caused a sea change in the way the public
views the surveillance system," said Democratic senator Ron Wyden, unveiling the bill
at a press conference alongside Republican Rand Paul.
"We are introducing legislation that is the most comprehensive bipartisan intelligence
reform proposal since the disclosures of last June," he said.
Wyden said the bill would set a high bar for "not cosmetic" intelligence reform, on the
eve of a series of congressional hearings into the NSA's surveillance powers that will
begin on Thursday.
The two other senators supporting the bill were Democrats Mark Udall, a long-time ally
of Wyden, and Richard Blumenthal, who has been at the forefront of efforts to reform
the secretive court process that grants surveillance warrants.
Their bill, the Intelligence Oversight and Surveillance Reform Act, merges competing
legislative proposals announced by the senators before the summer recess, and cherrypicks from ideas contained in about twelve other draft bills.
It would prohibit the NSA's bulk collection phone records of Americans under section
215 of the Patriot Act, the most controversial aspect of US surveillance revealed by
documents supplied by Snowden to the Guardian.
The bill would also prevent a similar data trawl of internet communication records,
which was stopped in 2011, and definitively close a so-called "backdoor" that potentially
enables the NSA to intercept the internet communications of Americans swept up in a
program protected by Section 702 of the of the Fisa Amendments Act.
<<pretty sure we have a card saying the only reason people were against Freedom Act
was b/c it was not big enough, if someone could copy paste that here, that would be
great b/c idk where it is>>
Legitimacy k
US Legitimacy can be rebuilt and key to global diplomacy
Lagon and Grebo’ Mar/Apr 2015
National Interest, Inc (Mark P. Lagon is Global Politics and Security Chair at the Master of
Science in Foreign Service (MSFS) Program at Georgetown University. He teaches MSFS
courses on Ethics and Decision-Making, and on the UN and Global Institutions. He is also
Adjunct Senior Fellow for Human Rights at the Council on Foreign Relations. SARAH
GREBOWSKI is a graduate student in the Master of Science in Foreign Service program at
Georgetown University and a member of the 2013–14 Future Leaders Program at the Foreign
Policy Initiative)
(Time for Societal Diplomacy Lagon, Mark P; Grebowski, Sarah
http://search.proquest.com.proxy.lib.umich.edu/docview/1657575483/C02D2DB32F994291PQ/
6?accountid=14667)
The first major goal of societal diplomacy is to carve out space for civil society worldwide,
especially in countries where illiberal governments are seeking to monitor and shrink the space
for civil society to dissent, resist and rally for reform. Openness and free expression facilitate
reform and innovation, which, in turn, spur economic development and prosperity. An
empowered citizenry may also be more likely to question going to war, which incentivizes more
peaceful and cooperative behavior among states. Second, societal diplomacy would serve to further U.S. interests by
hedging its bets on who will wield power in the future in a given country and enhancing its legitimacy by matching rhetoric about democracy
with deeds. The United States can gain flexibility in responding to unpredictable outcomes in countries where current power arrangements may
not hold. America should expand its notion of what defines a foreign partner to include liberal opposition actors in order to build relationships
that will outlast brittle autocracies. By nurturing relationships with democratic activists and community leaders, the United States can position
itself on the "right side of history," the term Obama so hesitantly used in reference to Egyptians calling for democratic change in 2011.
Finally, societal diplomacy would have positive ramifications for the United States' legitimacy as
a global leader. Popular acceptance of American global leadership has declined over the last
decade. According to the Pew Research Center's Global Attitudes Project, foreign countries'
confidence in the ability of the American president to "do the right thing regarding global affairs"
was dismal during the George W. Bush presidency (in 2005 and 2006, there was not a single
nation in which over 75 percent of its population expressed confidence), and has declined
throughout the course of the Obama presidency after an initial spike. In acting unilaterally to
invade Iraq on a false pretext, violating international human-rights standards at Guantánamo
Bay, and instituting a legally and ethically dubious targeted- killing program against suspected
terrorists, the United States has lost some of the moral authority that it once claimed as the leader
of the free world. Rebuilding a positive image on the world stage requires winning back the trust
of not only allied governments but also people around the world. Supporting liberal activists or
ngos in the Middle East now, for example, can help counter the damage done by decades of U.S.
support for authoritarian leaders in Egypt, Tunisia and elsewhere. Supporting civil society
throughout East Asia is equally important- from Hong Kong residents demanding direct
democracy, to repressed dissenters and worshippers elsewhere in China, to those jailed after the
coup in Thailand, to ngos still marginalized in Myanmar. By lending soft-power resources to
strengthen civil society around the world (for example, expertise and training, monetary support,
and the time and attention of its diplomats), the United States can chip away at the false idea that
its goal is to spread democracy by force-and the well-founded suspicion that its support for
democratization is selfservingly selective in practice.
Only tangible restrictions on the NSA will fix legitimacy
TF ’14 [Tech Freedom, April 1, 2014, TF, CDT, and 40 others tell Congress what real
NSA reform should look like, http://techfreedom.org/post/81391689035/tf-cdt-and40-others-tell-congress-what-real-nsa] //JJ
The White House has expressed support for reining in the NSA’s bulk
collection of Americans’ phone records, but with multiple bills in Congress it’s uncertain which specific reforms will be
included in the debate moving forward. To ensure whichever NSA reform bill advances is as
strong as possible, TechFreedom and 41 other nonprofits and businesses have sent a
joint letter to key policymakers outlining what any bill aiming to reform
bulk surveillance should include. Read the text below, and see the full letter for the list of signatories and
recipients: We the undersigned are writing to express support for ending the government’s bulk collection of data about individuals.
We strongly urge swift markup and passage of the USA FREEDOM Act (H.R.3361), which would enact appropriate surveillance
reforms without sacrificing national security. This
letter focuses on bulk collection, but
overbroad NSA surveillance raises many more privacy and security issues
that Congress and the Administration should address. We appreciate that Congress and the
Administration are converging on consensus that the National Security Agency’s (NSA) bulk *collection of telephone records must
end. Among
other things, legislation on bulk collection should: Prohibit bulk
collection for all types of data, not just phone records. Section 215 of the PATRIOT Act
applies broadly to business records, and the Department of Justice has claimed authority for bulk collection of any records that
reveal relationships between individuals. Legislation that focuses only on phone records may still allow for the bulk collection of, for
example, Internet metadata, location information, financial records, library records, and numerous other records that may help
“identify unknown relationships among individuals.” Prohibit
bulk collection under Section 214 as
well as Section 215 of the PATRIOT Act, or under any other authority. While the
NSA’s bulk collection of telephone records under the purported authority of Section 215 has received considerable attention, the
NSA engaged in the bulk collection of Internet metadata using the Pen/Trap
authority under Section 214 until 2011. Legislation that focuses solely on
Section 215 would still fail to prohibit the bulk collection of phone and Internet metadata
using Section 214, the National Security Letter (NSL) statutes, or another authority. Require prior court
approval for each record request. Under current law, the government must obtain
approval from the FISA court before it can force private entities to turn
over records (in bulk or otherwise) under Sections 215 and 214 of the PATRIOT Act. In addition, President Obama, in his
January 17th policy announcement, established that a judicial finding is required before the government can query the phone
records that the NSA collected in bulk. Congress
should leave this key safeguard in place. If
there is concern that the FISA Court would move too slowly to authorize
domestic surveillance beforehand, then the solution should be to provide
the FISA Court with sufficient resources.
Soft Power is portrayed and created through culture
Nye’ 3 Joseph S. Nye, Jr. is the University Distinguished Service Professor at Harvard.
Education - Nye attended Morristown Prep (now the Morristown-Beard School) in Morristown,
New Jersey and graduated in 1954. He went on to Princeton University, where he graduated
summa cum laude, Phi Beta Kappa, and won the Myron T. Herrick Thesis Prize. During his time
at Princeton, Nye was vice president of the Colonial Club, a columnist for The Daily
Princetonian, and a member of the American Whig–Cliosophic Society's Debate Panel.[10] After
studying Philosophy, Politics and Economics (PPE) as a Rhodes Scholar at Oxford University's
Exeter College, he obtained his Ph.D. in political science from Harvard University in 1964.
(Nye, Joseph. "Propaganda Isn't the Way: Soft Power." International Herald Tribune, January
10, 2003. http://belfercenter.hks.harvard.edu/publication/1240/propaganda_isnt_the_way.html)
Soft power is the ability to get what you want by attracting and persuading others to adopt your
goals. It differs from hard power, the ability to use the carrots and sticks of economic and
military might to make others follow your will. Both hard and soft power are important in the
war on terrorism, but attraction is much cheaper than coercion, and an asset that needs to be
nourished. Attraction depends on credibility, something a Pentagon propaganda campaign would clearly lack. On the
contrary, by arousing broad suspicions about the credibility of what the American government says, such a program would squander soft power.
Secretary of Defense Donald Rumsfeld is reported to be deeply frustrated that the U.S.
government has no coherent plan for molding public opinion worldwide. He is right to be
concerned. Recent polls by the Pew Charitable Trust show that the attractiveness of the United States declined significantly in the past two
years in 19 of 27 countries sampled. What can the government do? Soft power grows out of both U.S. culture and U.S.
policies. From Hollywood to higher education, civil society does far more to present the United
States to other peoples than the government does. Hollywood often portrays consumerism, sex
and violence, but it also promotes values of individualism, upward mobility and freedom
(including for women). These values make America attractive to many people overseas, but
some fundamentalists see them as a threat.
Download