Race Ethnicity & Religious Surveillance Aff 1ac 1ac Terrorism Adv The most recent DOJ Guidance for Federal Law Enforcement Agencies still fuels surveillance of racial, ethnic, and religious communities without any connection to criminal activity The Leadership Conference on Civil and Human Rights, 15 (2/24/15, The Leadership Conference on Civil and Human Rights, “Re: Concerns with the U.S. Department of Justice Guidance for Federal Law Enforcement Agencies Regarding the Use of Race, Ethnicity, Gender, National Origin, Religion, Sexual Orientation, or Gender Identity,” http://www.cair.com/images/pdf/2015-02-24TheLeadershipConferenceSign-OnLetterReDOJGuidanceRevisions.pdf, JZG + JMP) Dear Mr. President, On behalf of The Leadership Conference on Civil and Human Rights and the 81 undersigned organizations, we are writing to share our serious concerns regarding the Guidance for Federal Law Enforcement Agencies Regarding the Use of Race, Ethnicity, Gender, National Origin, Religion, Sexual Orientation, or Gender Identity (“the new Guidance”), issued in December of 2014 by the Department of Justice (“DOJ”). While the new Guidance included much-needed improvements to the 2003 Guidance Regarding the Use of Race by Federal Law Enforcement Agencies (“the 2003 Guidance”), many issues regarding the new Guidance remain. In particular, the new Guidance preserves loopholes from the 2003 Guidance and fails to address critical matters regarding its implementation, ultimately impeding Attorney General Eric Holder’s stated goal of eliminating discriminatory policing and profiling “once and for all.” We urge you to make addressing these concerns a priority so that your administration’s final policy and legacy truly upholds fair and equal treatment for all. Crafted under President George W. Bush and former Attorney General John Ashcroft, the 2003 Guidance was an important step forward in clarifying the Department of Justice’s (“DOJ” or “the Department”) position on racial profiling in law enforcement. Following the tragic events of September 11, 2001 and the initiation of our military campaigns in Iraq and Afghanistan, President Bush and Attorney General Ashcroft recognized that a federal directive was necessary in order to combat discriminatory law enforcement practices at home. Unfortunately, the 2003 Guidance that resulted from their efforts failed to accomplish this goal fully. Specifically, the Guidance failed to proscribe profiling on the basis of national origin or religion; included loopholes allowing law enforcement to profile on national security and border integrity grounds; did not expand the proscription on profiling to law enforcement surveillance activities; did not apply to state and local law enforcement agencies that work with federal law enforcement or receive federal funding; and failed to include enforcement mechanisms. Considering the events of this past year, now, more than ever, it is vitally important for these shortcomings to be addressed. The shooting deaths of Michael Brown in Ferguson, Missouri and Tamir Rice in Cleveland, Ohio, and the death of Eric Garner in Staten Island, New York, all at the hands of local police officers, along with the troubling pattern of unresolved cases of excessive use of force perpetuated by Customs and Border Protection agents along the southern border, have spurred a national movement calling for an end to discriminatory policing practices. The use of lethal force by police in Ferguson and New York City are extreme examples of the type of racial profiling that has occurred in those cities during traffic and pedestrian stops.1 Both you and Attorney General Holder have spoken candidly about your own personal experiences with racial profiling. With the proliferation of new technologies and surveillance capabilities, state laws that target specific communities, and federal programs that involve state and local law enforcement in civil immigration enforcement, we are at a critical juncture in our nation’s history. We had hoped the new Guidance would make clear once and for all that our government would not tolerate discriminatory policing practices. But, unfortunately, there are still serious flaws with the new Guidance, as indicated below: 1. The new Guidance preserves the loopholes that allow for profiling at the airports and in vast border regions by excluding Customs and Border Protection (“CBP”) and the Transportation Security Administration (“TSA”) from its requirements. These loopholes allow federal agents to target and search travelers solely because of their race, ethnicity, gender, national origin, religion, sexual orientation or gender identity. The new Guidance also fails to prohibit the pervasive practice of singling out and stopping individuals on suspected immigration violations for no reason other than baseless stereotypes. 2. The new Guidance effectively allows the Federal Bureau of Investigation (“FBI”) to continue its extensive data-gathering and “mapping” of racial, ethnic, and religious communities, a technique FBI Director James Comey recently admitted that the FBI uses.2 Racial and ethnic mapping involves collecting data on “racial and ethnic oriented” neighborhoods, businesses, and places of worship to “map” and investigate those communities. The FBI has conducted mapping programs in the Muslim, Latino, African-American, Russian, and Chinese communities throughout the United States. This practice of gathering data on communities based on race, ethnicity, religion, or any other protected category for law enforcement and intelligence activities should be immediately discontinued. Justice also demands transparency for affected communities, as well as further information about how the FBI’s racial and ethnic mapping operation has been developed and deployed.3 We request that DOJ publicly disclose the maps that the FBI produced, and explain how the FBI uses these maps in carrying out its law enforcement and intelligence activities. 3. The new Guidance allows law enforcement to continue directing sources and informants to spy on particular communities based solely upon their protected characteristics—e.g., race, ethnicity or religion—regardless of any connection to criminal activity. This coercive practice allows for the continued and discriminatory infiltration of First Amendment protected spaces such as mosques or other houses of worship, and community organizations or events by FBI agents or informants so that they may observe, take notes and collect information, all without evidence of criminal activity. Allowing these practices to continue subjects entire racial, ethnic and religious communities to potential surveillance by law enforcement, the chilling effect of which cannot be overstated. For example, because of the New York Police Department’s (NYPD) Muslim spying program, many Muslims are afraid to attend mosques for fear of being targeted by law enforcement informants and officers. DOJ should announce a policy clarifying that this law enforcement practice violates the stated goals of the Guidance and end this discriminatory practice. The FBI director even admitted the new guidelines will have no effect on agency policies Phelps, 14 (12/9/2014, Timothy M., “Comey says new profiling guidelines will have no effect on the FBI,” http://www.latimes.com/nation/la-na-fbi-comey-profiling-20141209-story.html, JMP) The new Justice Department guidelines governing profiling by federal law enforcement officers will have no effect on FBI practices, its director, James B. Comey, said Tuesday. On Monday, Comey’s boss, Atty. Gen. Eric H. Holder Jr., said the new guidelines were “a major and important step forward to ensure effective policing by federal law enforcement officials.” But at a press briefing Tuesday, Comey said that the FBI, the lead federal law enforcement agency, is already in compliance with the new guidelines and strongly asserted that no changes were required. The guidelines “don’t have any effect on the FBI,” he said Asked whether the new guidance would change anything to FBI does now, Comey said, “No, nothing. It doesn’t require any change to our policies or procedures.” He said the FBI field manual for agents would not be changed because it was already in compliance with the guidelines, which expand restrictions on racial and ethnic profiling to cover religion, national origin, sexual orientation and gender identity. He defended the FBI practice of “mapping” communities to identify neighborhoods by race, religion or national origin. Civil rights leaders were critical Monday of the failure of the Justice Department to curtail the practice. “We need to be able to understand the communities we serve and protect,” Comey said. “When there is a threat from outside the country, it makes sense to know who inside the country might be able to help law enforcement.” “It is about knowing the neighborhoods: what’s it like, where’s the industry, where are the businesses, are there particular groups of folks who live in a particular area?” The government is pressuring Muslim-Americans to become informants to conduct surveillance to try and combat extremist recruiting Glionna, 14 (11/3/2014, John M., “U.S. Muslim leaders say FBI pressuring people to become informants,” http://www.latimes.com/nation/la-na-muslims-fbi-20141103-story.html, JMP) Muslim leaders nationwide say the FBI is pressuring some Islamic community members and religious leaders to spy on fellow Muslims as part of a government effort to combat extremist recruiting in the U.S. The campaign has intensified in recent weeks, with mosques in California, Texas, Minnesota, Ohio, Florida and other states reporting unannounced visits by FBI agents, according to the Council on American-Islamic Relations, or CAIR, the nation's largest Muslim civil rights and advocacy organization. In a nationwide alert, the group urged mosque and community leaders to seek the advice of an attorney if they are approached by the FBI for questioning. They worried that the civil rights of numerous imams were being violated as the religious leaders were asked to meet with FBI agents, who then pressed them to inform on members of their congregations. “It’s happening all over the country," said Ibrahim Hooper, a Washington-based spokesman for CAIR. “The agents are approaching these community leaders at mosques with basic questions that quickly turn into something different: pressure to become informants.” Leaders at several mosques in California and Minnesota contacted for comment said they were afraid to speak out for fear of becoming a government target. The FBI would not comment on the CAIR alert, but spokesman Paul Bresso said in an email that the agency respected the rights of all citizens and “we value our partnerships with the Arab, Muslim and Sikh communities as they are partners in our efforts to stem crime, violence and civil rights violations." One agent said such visits were standard procedure. “It’s not unusual for us to go out and talk to, I don’t want to call them at-risk folks, but people dealing with issues,” said the agent, who declined to give his name because he was not authorized to talk about the matter. Jennifer Wicks, an attorney who heads the civil rights department for CAIR, said she knew of no crimes committed by FBI agents. “No one has been detained in any way or taken from one setting to another,” she said. She said the interrogation tactics depended on the agent and the situation. “These visits aren’t based on people being suspected of doing anything wrong. It’s because this is a Muslim community. That’s why people are being targeted,” Wicks said. “However, the FBI's over-broad and coercive use of informants in mosques, reports of outreach meetings being used for intelligence gathering and other acts of abuse demonstrate that community leaders should engage legal professionals to ensure the protection of their rights and those of their congregations,” Wicks said in a statement on the CAIR website. Activists said the visits were tantamount to religious profiling. “For us, the issue is one of civil rights,” Hooper said. “Too often these interactions are done in private and people feel coerced. Because ISIS is a hot topic, they’re going to mosques. It’s all based on the round-up-theusual-suspects style of law enforcement.” Federal officials are calling for new ways to fight what they see as the nation’s latest national security threat: people indoctrinated by extremists returning to plan terrorist acts here. The Justice Department recently unveiled a pilot program in Los Angeles, Boston and Minneapolis that enlists social and mental health workers, religious leaders and police to thwart Islamist group recruiters. Orlando, Fla., attorney Hassan Shibly said he had represented 33 clients this year who claimed they had been pressured by the FBI to release information on their religious beliefs and practices. He said the number of cases had risen dramatically in the last few weeks. “In Orlando, they pressured one citizen who happened to be Muslim to spy on mosques, Islamic restaurants and hookah lounges or they would throw him in jail,” he said. “In another case, they approached an imam with pictures of a woman they claimed would testify of an affair unless he helped them. These are law-abiding Muslims, not criminals.” He has taken those and other cases to court, alleging the FBI was using illegal tactics to gain information. Shibly said Muslims were targets because many didn't know their legal rights. "The FBI thinks it can get away with bending the law," he said. "Many Muslims come from Third World countries where such practices are common fare for the secret police. But in the U.S. you don’t expect such blackmail, with threats of deportation or worse." In several cases, Shibly said, imams were asked about their opinions on political affairs and other matters. Agents return and tell the imams that informants have contradicted their previous statements. "They are laying the groundwork for a charge of giving false information to a law enforcement officer. That’s the trick to get them to cooperate,” he said. This FBI surveillance without reasonable suspicion sends chills through Muslim communities, deters cooperation with law enforcement and undermines anti-terror efforts. This counter-terror strategy is being exported to other countries. Shah, 14 --- legislative counsel at the ACLU’s Washington legislative office (7/21/2014, Naureen, “The FBI’s counterterrorism sting operations are counterproductive; Feds sow mistrust and target the poor, desperate and mentally ill,” http://america.aljazeera.com/opinions/2014/7/fbi-stingoperationscounterterrorismadeldaoud.html, JMP) Adel Daoud is no Ferris Bueller. A Chicago suburban teen, he couldn’t drive himself to the Jewel Osco grocery store down the street without getting lost, let alone pull a Bueller and hoodwink his parents into letting him have the day off school. He is a D student and forgetful in the extreme. “He’s not a person with a complete mind,” his mother told me. Yet the FBI began targeting Daoud as a terrorist mastermind shortly after his 18th birthday. At the time the FBI began its sting operation, Daoud wasn’t part of a terrorist cell, nor was any group recruiting him. He was, though, on the Internet, looking for answers about Islam and jihad. At home and at his local mosque, the Muslim teen was told that jihad was nonviolent: It meant supporting your family by being a good son. FBI undercover employees, finding Daoud online, did not affirm that message. Instead, they worked with Daoud, ultimately driving him to downtown Chicago to detonate a weapon of mass destruction outside a bar. Chicago’s Muslim communities were stunned by the Daoud’s arrest in September 2012. For many, the first question was why. Why target as a terrorist-in-waiting a teen who was plainly incapable of planning and conducting a terrorist attack? The second question was one of fear: Will my child be the FBI’s next target? As a report released today by Human Rights Watch and Columbia Law School’s Human Rights Institute documents, the FBI’s tactics in some terrorism sting cases are not only abusive but counterproductive. They instill fear of law enforcement instead of mutual trust. And they potentially divert FBI resources from actual terrorism threats. Sting operations are nothing new, but the FBI is using significantly more aggressive tactics in American Muslim communities than it has in others. It is deploying informants and undercover FBI agents to mosques and community centers around the country in what sometimes appear to be virtual fishing expeditions. In some cases, the FBI has instructed informants to strike up conversations about jihad with anyone who will listen. These investigations appear to pick off the lowest-hanging fruit, including the mentally ill and the poor, who are vulnerable to manipulation. In one case, the subject of “The Newburgh Sting,” an HBO documentary premiering this week, an informant promised a 45-year-old African-American man $250,000 to participate in a fake attack. After losing his job at Walmart, the man accepted the offer. For every terrorism bust the FBI claims based on such tactics, there is a cost. Deploying informants and conducting surveillance without reasonable suspicion has sent chills through many American Muslim communities. Some parents with whom we spoke feared the FBI might recruit their teenage kids to become informants on their communities. Others said they feared that strangers in their mosques and community centers could be undercover FBI agents or infiltrators, hunting for youth to entrap in fake terrorist plots. This kind of fear — in any context and no matter its actual merit — is a recipe for bad policing, since distrust of law enforcement can deter citizens from reporting a crime tip or fully cooperating in bona fide crime investigations. The government has racked up hundreds of convictions based on terrorism stings. Multiple studies have found that nearly half of federal terrorism convictions since the 9/11 attacks resulted from informant-based cases. Some may be lawful and justifiable, yet almost 30 percent of these convictions were sting operations in which the informant played an active role in the underlying plot. In too many cases, the government, often acting through informants, developed the fake terrorism plot, persuaded and sometimes pressured the targeted individuals to participate and provided the resources to carry it out. The FBI’s wisdom in pursuing these cases, rather than investigating threats and individuals who were actually operational, is questionable at best. Similarly questionable is the government’s expansive surveillance and collection of information about all Americans, including American Muslims, which we continue to learn about through revelations from National Security Agency whistleblower Edward Snowden. Rather than helping FBI analysts connect the dots, the flood of data is impairing the FBI’s ability to properly assess and respond to threat information it receives. While we can’t expect the FBI to prevent every terrorist attack, recent ones like the Boston Marathon bombing show the need for a sober re-evaluation of the agency’s methods. Unfortunately, the Justice Department and the FBI appear unwilling or unable to critically evaluate their track record. Last week Attorney General Eric Holder urged U.S. allies to follow the FBI’s lead and adopt the same counterterrorism sting tactics. Before the U.S. exports these terrorism tactics, it should reckon with their costs. Specifically, these concerns over surveillance are dissuading Muslim communities from fully supporting Obama’s program to Counter Violent Extremism Audi, 15 (4/20/2015, Tamara, “U.S. Muslim Community Divided Over White House Outreach Plan; Lawenforcement efforts to prevent radicalization provoke both support and suspicion,” http://www.wsj.com/articles/u-s-muslim-community-divided-over-white-house-outreach-plan-1429555173, JMP) MISSION VIEJO, Calif.—On a recent Friday in a mosque on the edge of an office park here, congregants filled rows of plastic chairs to hear community leaders discuss the role the White House hopes they will play in a new government effort to fight terrorism. Instead, what they got was a debate over the proposed law-enforcement outreach to Muslim groups through community events, mentoring and youth programs, which are intended to prevent radicalization and identify extremists. Some Muslim leaders argued the government’s plan unfairly casts suspicion on the entire Muslim community, while others urged involvement as a way for Muslims to have a voice and safeguard their communities. “We’re being pushed into this law-enforcement framework that’s inappropriate,” said Todd Gallinger, a representative of the Council on American Islamic Relations, or CAIR, in the mosque discussion. “This is something we need to avoid.” But Salam Al-Marayati, president of the Muslim Public Affairs Council, encouraged participation, saying, “CVE is a tool.” He added that the community should think about how to “leverage CVE so that our community is seen for what it is—that it is part of the solution and has nothing to do with the problem.” The rift playing out in the Orange County mosque and elsewhere demonstrates the challenge the Obama administration faces as it attempts to sell its plan, called Countering Violent Extremism, or CVE, to the communities crucial to its success. The issue has gained potency with the rise of Islamic State, or ISIS, a violent Islamist group aggressively recruiting young Westerners. On Monday, the U.S. charged six Minnesota men in connection with attempts to join Islamic State, in a case involving one of the largest groups of potential foreign fighters. Minneapolis, with the country’s largest Somali immigrant population, is one of three pilot cities meant to test CVE programs before they are rolled out on a larger scale. Federal officials said the test cities, which include Boston and Los Angeles, were chosen because of strong existing relationships between the Muslim communities and law enforcement. Government officials and supporters of the program say it isn’t a spy or intelligence-gathering mission. They note it was developed with the input of Muslim leaders from across the country, with an emphasis on mental health, social services and community-style policing, according to an administration official The U.S. Council of Muslim Organizations, an umbrella group, said earlier this year that CVE singles out Muslims for law-enforcement scrutiny, which it called “constitutionally questionable and morally problematic.” We have concerns about any program that might violate civil rights, and on the other side, we are very much concerned about individuals falling into the trap of the wrong argument ISIS is putting out there to recruit innocent young people,” said Oussama Jammal, secretary-general of the group. “We’re in a tough position.” The CVE programs are tailored to specific community needs, administration officials say. For example, many of the Somali immigrant Muslims in Minneapolis struggle with unemployment. Muslim communities in Los Angeles are more economically and ethnically diverse, and new immigrants often have trouble finding social and health services. In Boston, a college town that draws a diverse Muslim student population, the program could include psychologists to work with young people. Federal officials are meeting with Muslims groups across the country to discuss the program, the administration official said. Already, more than two dozen religious and civil-rights groups have publicly opposed or criticized CVE, including the American Civil Liberties Union, CAIR, Muslim Advocates and New York University’s Brennan Center for Justice, as well as some Muslim student associations and Muslim religious leaders. Some say they fear that the plan may include surveillance of Muslims. Despite the criticism, government officials say many Muslim communities have embraced the program, such as in Denver and Detroit, especially in the wake of more high-profile prosecutions of young people from the U.S. attempting to join Islamic State. Hennepin County Sheriff Rich Stanek, whose county includes Minneapolis, spoke about his outreach efforts at the White House summit on CVE earlier this year. He and others from his department attend Somali community events several nights a week. His department also hired a Somali refugee to serve as ambassador to the Somali community. Under CVE, Mr. Stanek said he hopes to expand that outreach with more community liaisons to the Somali community. “We’ve built trust and that’s paid off tremendously,” Mr. Stanek said, pointing to the arrests in Minnesota as partly the result of information provided by community members. “This is what community outreach progarms are about.” “People are really worried about” ISIS recruitment, said an administration official. “So if Muslim-American groups are concerned, that’s not the government singling them out. That’s the government responding to their needs.” Another administration official recalled that in meetings with Muslim leaders at the White House earlier this year, President Barack Obama said that “there have been cases in the past that made the community more mistrustful, and said that’s why it’s so important for the community to be more involved.” “The core of this program is building healthy and resilient communities, promoting civic participation,” said Joumana Silyan-Saba of the Los Angeles Human Relations Commission, who worked on L.A.’s CVE. Law enforcement has a role, she said, but the program also calls for beefing up social services for immigrant families. That hasn’t been enough for some Muslims, who point to high-profile instances of surveillance in the past decade, including a Federal Bureau of Investigation informant in Orange County. In the latter case, Craig Monteilh, a convicted check forger, said in court documents that the FBI hired him to pose as a Muslim and spy on mosques in the area. The FBI said it used him as a “confidential human source,” but didn’t detail his actions in court documents. An FBI spokeswoman said the FBI doesn’t target any individual or group based on religion. Metra Salem, a 36-year-old mother of three and the daughter of Afghan immigrants, said she supports the Obama plan. “I want my kids to be part of this country. I’m tired of this victim-minority-group, marginalization narrative,” she said. Mohannad Malas, a member of the mosque’s board, said he hadn’t heard enough to come to conclusions. His mosque regularly hosts visits from local law enforcement and city officials, he said, adding, “We have nothing to hide.” But Mr. Malas cited the visit years ago by an official from the FBI’s Los Angeles office. “He told us that he thinks of our community as the solution, and after that visit, we felt part of the solution,” Mr. Malas said. “Turns out, they were planting an informant [Mr. Monteilh].” There is a direct relationship between the government’s coercive surveillance and the willingness of Muslim Americans to cooperate with Homeland Security Olson, 14 (11/14/2014, David, “Homeland Security chief touts cooperation with Muslims; But some Muslim and civil-rights organizations say they still don’t trust the federal government and worry about informants in mosques,” http://www.pe.com/articles/johnson-754183-meeting-muslims.html, JMP) Some Southern California Muslim leaders Thursday left a meeting with U.S. Homeland Security Secretary Jeh Johnson worried about what they view as continued government stigmatization of Muslims, while others said they were optimistic about Johnson’s talk of cooperation and collaboration with their mosques and communities in combating extremism. The meeting at a Rowland Heights mosque was part of a three-day visit by Johnson to Southern California. Today, he is scheduled to deliver congratulatory remarks during a ceremony at the Ontario Convention Center in which about 1,000 immigrants will become citizens. During a news conference Thursday outside the mosque, Johnson said the meeting with several dozen Muslim leaders was “to build partnerships and build trust” and to “hear some of the issues and grievances people in the Islamic community have” with, among other issues, passenger screening at airports. Johnson called Islam a religion of peace and said he realized that only a tiny number of U.S. Muslims are extremists. But he asked for Muslims’ help in detecting extremists who could be prone to violence, dissuading them and, if necessary, contacting law enforcement. “This is as much your homeland, your country, your public safety as anybody else’s,” Johnson said as he was flanked by several participants in the meeting. Corona’s Hussam Ayloush, executive director of the greater Los Angeles chapter of the Council on American-Islamic Relations and one of the Muslim leaders with whom Johnson met, gave Johnson credit for meeting with area Muslims. But he said Johnson offered few details on DHS’ fledgling Countering Violent Extremism program and worried that DHS would continue previous FBI practices of sending informants into mosques. The FBI has repeatedly been accused of infiltrating mosques. One of the best-known alleged informants, Craig Monteilh, said he was paid by the FBI to record conversations in Orange County mosques in 2006 and 2007. The FBI has said in the past that its investigations were based upon allegations of criminal activity, while Ayloush and other civil-rights leaders said the infiltration of mosques were fishing expeditions that sometimes involved trying to goad people into making extremist statements. In September, an Ontario man and a Pomona man were convicted of conspiring to murder U.S. troops overseas and other crimes after a paid FBI informant who was a convicted drug felon testified against them. The men’s attorneys accused the informant of being a provocateur who entrapped their clients, and CAIR expressed concern that the informant led the men into the alleged plot. Prosecutors said the men were plotting an attack long before the informant started monitoring them. Asked at the news conference whether DHS sends or would send informants into mosques without mosque leaders’ knowledge, Johnson did not answer directly. “There’s a distinction to be drawn between asking someone to be an informant and asking for public participation ... to be on the lookout for potential acts of violence,” he said. Ayloush said continuing distrust of the federal government among some Muslims makes it less likely they will report suspicious activity. “The more we marginalize a community and undermine the trust between a community and law enforcement, the harder we make it to partner with law enforcement or report suspicious activities,” he said. Failure to resolve the trust deficit caused by surveillance policy will undermine the implementation of the CVE program --- it’s necessary to prevent U.S. youth from joining ISIS and returning home to carry out terrorist attacks Schmitt, 14 (10/5/2014, Eric, “U.S. Is Trying to Counter ISIS's Efforts to Lure Alienated Young Muslims,” Lexis, JMP) DUBLIN, Ohio -- In this central Ohio town, parents and community leaders are expressing growing fears that their youths may succumb to the Islamic State's savvy social media appeal to join its fight on battlefields in Iraq and Syria. But when Homeland Security Secretary Jeh Johnson showed up recently at the Noor Islamic Cultural Center here to offer a sympathetic ear and federal assistance, he faced a litany of grievances from a group of mostly Muslim leaders and advocates. They complained of humiliating border inspections by brusque federal agents, F.B.I. sting operations that wrongly targeted Muslim citizens as terrorists and a foreign policy that leaves President Bashar al-Assad of Syria in place as a magnet for extremists. ''Our relationship has to be built on trust, but the U.S. government hasn't given us very many reasons to build up that trust,'' said Omar Saqr, 25, the cultural center's youth coordinator. As the United States carries out yet another bombing campaign across two Islamic countries, the Obama administration is redoubling its efforts to stanch the flow of radicalized young Muslim Americans traveling to Syria to join the fight and potentially returning as well-trained militants to carry out attacks here. American law enforcement and intelligence officials say more than 100 Americans have gone to Syria, or tried to so far. That number of Americans seeking to join militants, while still small, was never seen during the two major wars fought in Afghanistan and Iraq after the terror attacks of Sept. 11, 2001. The threat of homegrown radicals like the Boston Marathon bombers has prompted the F.B.I., the Department of Homeland Security and other federal agencies to try to forge ties with community leaders and police departments as a front line in the war against a sophisticated online propaganda and recruiting effort mounted by the Islamic State. But as administration officials attempt to accelerate their own lobbying campaign, they have found that security rules put in place to defend America from a terror attack have played a role in alienating young Muslim men and women -- the exact group being courted by the Islamic State, also known as ISIS or ISIL. Still, community leaders are so fearful their youths may follow the Islamic State's propaganda that, during a 90-minute meeting with more than 60 local leaders, police officers and advocates, they pressed Mr. Johnson to prove the government is sincere in its offers of help. Lila Al Sibai, a 28-year-old mother of three young children and a member of the cultural center's board, asked for a $4 million federal grant to build a new gym and classrooms for the facility. ''We need to have more activities for our youth,'' she said after the meeting in this suburb of Columbus, which is the home of the country's second-largest Somali-American community, behind only Minneapolis. Mr. Saqr, the youth coordinator, suggested that Mr. Johnson's agency offer a prize to the best countermessage to the Islamic State's propaganda. ''Our youth are being hoodwinked and hijacked by their rhetoric,'' he said. ''We cannot just say ISIS is bad. That's not an option. We need an outlet.'' And Hossam Musa, 34, the imam of the cultural center, which draws 4,000 to 5,000 people for Friday Prayer each week, proposed that the Department of Homeland Security hire authoritative Islamic scholars to help combat the Islamic State's violent narrative. ''How do we beat ISIL? What's our response to a young man wowed by their message? You beat them at their own game,'' he said. Mr. Johnson, the nation's top homeland security official since December, was here as part of a community outreach tour that so far this year has taken him to the Chicago area, and will land him in Los Angeles, New York and other cities in the coming months. His aim is to build partnerships between the federal government and the local law enforcement, educational and community groups that are better positioned to detect potential militants in their midst and to derail those young men and women from the path of radicalization before they turn violent. These efforts have been underway since the Sept. 11 attacks, but have often failed to gain traction, government officials acknowledge. ''We can't allow youth to fall prey to ISIL's ideology,'' Mr. Johnson said. ''We need to provide them an alternative to rechannel their hopes and rechannel their passions.'' It is a clarion call also sounded by the F.B.I., the Justice Department and the National Counterterrorism Center, which together with Mr. Johnson's agency recently started pilot programs in Boston, Los Angeles and Minneapolis. The goal is to reach out to schools, health care providers and community groups to get their help in monitoring and deterring the radicalization of young people who may be susceptible to recruitment -- like the two brothers who carried out the Boston Marathon bombings, which killed four people last year. The White House is sponsoring a meeting later this fall with specialists from across the country. But even former top counterterrorism officials say the administration faces an uphill battle. American officials have been able to identify Americans fighting for the Islamic State or other Syrian rebel groups based on intelligence gathered from travel records, family members, intercepted electronic communications, social media postings and surveillance of Americans overseas who had expressed interest in going to Syria, counterterrorism officials said. But efforts at countering violent extremism, especially at home, ''have lagged badly behind other counterterrorism pillars,'' said Michael Leiter, a former director of the National Counterterrorism Center. ''It is heartening to see the administration attempt to invigorate those efforts, but it is unfortunate that it has, despite the efforts of many, been so long in coming.'' Government supporters question whether funds will be available to sustain these programs. ''The administration has the right framework for doing this, but long-term success will depend on sustainable resourcing to help local government, communities and law enforcement build initiatives that can have impact,'' said Quintan Wiktorowicz, a former senior White House aide who was one of the principal architects of the current strategy. That strategy here at home, called countering violent extremism, has proved much more difficult for American officials to master than the ability of the Pentagon and spy agencies to identify, track, capture and, if necessary, kill terrorists overseas. Among its efforts, the Department of Homeland Security provides training to help state and local law enforcement officials in identifying and countering the threat, including indicators of violent extremism and ''lone wolf'' attacks. The department awarded the International Association of Chiefs of Police a $700,000 grant last year to develop training on how to prevent, respond to and recover from acts of terrorism. The department has also sponsored exercises in seven cities, including Houston, Seattle, and Durham, N.C., to improve communication between local law enforcement and communities and to share ideas on how best to build community resilience against violent extremism. ''We're raising awareness,'' said David Gersten, who was recently named the department's coordinator for the overall effort. Carter M. Stewart, the United States attorney in the Columbus area, said he and his staff meet regularly with Somali-American and other community leaders. But Muslim advocates say there is deep suspicion that, despite all the meetings and the talk of outreach, the government's main goal is to recruit informants to root out suspected terrorists. ''I don't know how we can have a partnership with the same government that spies on you,'' said Linda Sarsour, advocacy director for the National Network for Arab American Communities. Indeed, those who met with Mr. Johnson were conflicted, some saying they were pleasantly surprised he had traveled here to put a face on the federal effort, but clearly embittered by their past experiences with the government. Now is critical --- a wave of attacks is possible and current surveillance policies will fail. Only ensuring the implementation of the CVE strategy can prevent them. Cohen & Farmer, 15 --- *former Acting Undersecretary for Intelligence and Analysis and CounterTerrorism coordinator at the U.S. Department of Homeland Security, AND **former senior counsel for the 9/11 Commission (6/19/2015, John & John --- both serve on the faculty of Rutgers University’s Faith-Based Communities Security Program at the Institute for Emergency Preparedness and Homeland Security, “As terrorist threat changes, so should ways we combat it,” http://thehill.com/blogs/congress-blog/homelandsecurity/245478-as-terrorist-threat-changes-so-should-ways-we-combat-it, JMP) This week's calls by ISIS on social media for lone-wolf terrorist attacks outside of Syria and Iraq raises the specter of a wave of attacks like those law enforcement has confronted in Paris, Copenhagen, Dallas, and Boston. This threat coincides with elevated concern by the FBI and also raises the question of whether law enforcement's tactics have evolved to meet the transformed threat posed by people who are inspired by organizations like al Qaeda or ISIS but who act independently of them. Such threats are by nature more difficult to detect or deter and are, increasingly, directed at law enforcement itself. The threat to our nation by independent, violent extremists is the newest element to an always evolving and ever-changing threat environment, and an element our traditional counter-terrorism capabilities may be ill suited to address. Fourteen years after September 11th, much has changed to keep our country safer. We now have a robust counter-terrorism infrastructure weaving together our nation’s intelligence, military and law enforcement capabilities. But it is a system designed to prevent attacks by individuals or groups acting under the control of designated foreign terrorist groups. This threat has not gone away as groups like ISIS and al-Qaeda still pose a significant risk to the US. But our infrastructure was not intended to detect and mitigate the threat posed by individuals living in the U.S. who are inspired by extremist ideology but who do not have an affiliation with foreign terrorist organizations. These individuals find resonance in the messages they view online and via sophisticated social media campaigns employed by groups like ISIS, and become willing to carry out attacks without ever interacting with other members of a terrorist group. In August 2011, the Obama administration released the country’s first national strategy to prevent violent extremism domestically. The countering violent extremism (CVE) strategy focused on the principles that “(1) communities provide the solution to violent extremism; and (2) CVE efforts are best pursued at the local level, tailored to local dynamics, where local officials continue to build relationships within their communities through established community policing and community outreach mechanisms.” Last summer, Rutgers University initiated a project examining mass casualty attacks in Europe and the U.S. for the purposes of identifying effective prevention strategies. Through this effort we have worked closely with law enforcement officials, faith leaders, mental health professionals and others. We have concluded that while the language of the national strategy is sound, we believe that in practice, we have strayed from the intended approach and it is time to re-focus the implementation of the president’s strategy. CVE means more than outreach to the Arab-American and Muslim communities, which senior leaders at the Department of Homeland Security and other agencies have been conducting. Roundtables do not solve problems. If the discussions do not include concrete and tangible ways that authorities and community members can work together to prevent violence in a given jurisdiction, then we cannot mitigate this threat. Addressing this threat also means more than "countering the narrative." We need to better understand why an increasing number of people from European nations, Canada and the U.S. are inspired by ISIS-like narratives and are willing to join the ideological cause and carry out a violent attack in furtherance of this ideology. The federal government simply does not have the resources to conduct surveillance and investigate the expanding number of individuals who derive inspiration from groups like ISIS. More then ever, we must empower local efforts to strengthen critical partnerships between law enforcement, the communities they serve and others such as mental health professionals, educators, and faith leaders. We must create a holistic and collaborative way to detect, assess and intervene in situations where individuals may exhibit the behaviors and indicators of violent extremism as to prevent a violent attack. Aggressive law enforcement remains necessary to counter violent extremism, but it alone is no longer sufficient. We must adopt an approach to CVE that recognizes the limitations of "detect and arrest" in the new threat environment; traditional law enforcement tactics must be supplemented by approaches that engage local communities and civil society to identify incipient at risk individuals and to develop other, earlier forms of intervention. The plan will rebuild relations with Muslim communities and alleviate the fear surrounding terrorism investigations involving informants. The intel that is collected from current surveillance strategies is useless --- the FBI uses this policy to manufacture terror plots. Stabile, 14 --- J.D., University of California, Berkeley, School of Law, 2013 (February 2014, Emily, California Law Review, “Recruiting Terrorism Informants: The Problems with Immigration Incentives and the S-6 Visa,” 102 Calif. L. Rev. 235, Lexis, JMP) C. Terrorism Informants' Presence in Muslim and Middle Eastern Communities Damages Intelligence Efforts Many argue that tactics like recruiting informants through immigration law and surveilling mosques are necessary to prevent terrorist attacks, and that national security must be the nation's top priority, whatever the cost. These arguments fail to recognize that when informants lack a specific target and direction, the gathered intelligence does not necessarily enhance the nation's security. Instead, the FBI - with little concern for the actual gravity of the original threat posed by the suspect - creates an elaborate terrorism plot for the surveillance targets to participate in. n100 After 9/11, many individuals who showed no signs of violence or extremism prior to involvement with informants and government-created plots have been prosecuted under terrorism charges. n101 Until the informants provided the means, these individuals did not have the finances or the proper connections to conceive and carry out these terrorism plans. Although orchestrating these plots makes the FBI's preventative stance appear successful in the public eye, it diverts law enforcement resources from focusing on real targets. Moreover, Professor David A. Harris claims that "the unregulated use of informants in mosques and other religious and cultural settings can also do great damage because it poses the risk of cutting off our best possible source of intelligence: the voluntary, cooperative relationships that have developed between law enforcement and Muslim communities." n102 Having community members report suspicious information to the FBI may be a more effective way of obtaining reliable terrorism intelligence from these communities. n103 For example, in the few domestic terrorist prosecutions where a terrorist attack plan actually existed prior to informant involvement, community members who had noticed something amiss were the first to alert the FBI and identify the subjects. n104 In fact, since 9/11, community members have assisted law enforcement in stopping potential terrorism plots in a number of cases. n105 A [*252] recent example, the case of Umar Farouk Abdulmutallab, the "Underwear Bomber," shows that the attempted bombing could have been prevented had law enforcement heeded the warnings that Abdulmutallab's father gave the CIA at the U.S. embassy in Nigeria. n106 As the president of the San Francisco Board of Supervisors and former criminal prosecutor, David Chiu testified regarding the Arab, Middle Eastern, Muslim, and South Asian communities in San Francisco: "Without that level of cooperation, that level of trust, everything falls apart ... . Surveillance only serves to continue to drive wedges when cooperation is what is needed most." n10 Analogous to the way informants in mosques target vulnerable individuals despite these individuals' lack of connection to terrorist organizations or predilection for extremism, a 2011 study by the Migration Policy Institute demonstrates a similar phenomenon within other communities. n108 The 287(g) initiative, named after the section of the Immigration and Nationality Act that authorized it, allows ICE to enter into memorandums of agreement with state and local law enforcement agencies, empowering these agencies to directly enforce immigration laws. n109 However, the study found that half of the jurisdictions using 287(g) did not direct their enforcement efforts toward serious or violent offenders, n110 as the 287(g) initiative had originally envisioned. n111 Instead, these jurisdictions sought to deport as many offenders as possible regardless of the severity of the crime. n112 Study respondents "believe that 287(g) program activities affect the community in distinct and adverse ways, including by causing declines in Latino immigrant populations, [creating] avoid[ance of] public places by these populations, changing [] driving behavior, [creating] fear and mistrust of the police and other authorities, and reducing crime reporting." n113 These behaviors were more acute in jurisdictions with nontargeted enforcement, [*253] where any offense could constitute grounds for deportation. n114 Just as Latino immigrant communities became distrustful of law enforcement and withdrew from crime reporting when threatened with deportation, so did Muslim and Middle Eastern communities when threatened with FBI surveillance of communal spaces. As the study notes, "these operations can generate widespread distrust of police. Such distrust in turn prompts immigrants to change their behavior to avoid contact with police and other authorities." n115 In order to procure accurate intelligence from any community, a relationship of trust and respect between law enforcement and the community must exist. n116 However, from the mass arrest and detention of Muslims shortly after 9/11 n117 to the ongoing allegations of ethnic and religious profiling today, n118 the federal government has made serious errors in dealing with Muslim and Middle Eastern communities since 9/11. While the government recognizes that community policing n119 is the best way to obtain reliable intelligence, n120 the FBI is caught between two contradictory strategies and must choose between sending informants into mosques without reasonable suspicion, and gaining the trust and cooperation of Muslim and Middle Eastern communities. As one congregant in a surveilled mosque observed, "The FBI wants to treat the Muslim community as a partner while investigating us behind our backs ... . They can't have it both ways." n121 While it is unrealistic to think that the FBI will stop using informants in these communities, a more restrained use of informants based on reasonable suspicion of wrongdoing would mitigate perceived damages to community relations. Requiring the FBI to have preexisting reasonable suspicion would add credibility to the agency and alleviate some of the fear surrounding terrorism investigations involving informants. [*254] By virtue of their connections and daily interactions, those active in a particular community are in the best position to notice when others in the community act strangely. Unlike informants who may be new to the community and who other members may view with suspicion, well-established community members may already know what is going on in their community and can more accurately spot genuine threats. Boston demonstrates that a strong community based strategy is essential for effective counterterrorism --- we control the strongest internal link Quinan, Lawyer and criminologist, AND Rameriz, 13 (6/24/2013, Tara Lai Quinlan and Deborah Ramirez, “The Boston Tragedy Reveals the Need for Community-Based Counterterrorism Strategies,” http://www.huffingtonpost.com/deborah-ramirez/counterterrorism-strategy-bostonbombing_b_3148235.html, JMP) As part of the Boston community, we share the sadness of last week's Boston Marathon bombings. Thanks to excellent police work and public cooperation, Tamerlan and Dzokhar Tsarnaev were identified as the perpetrators and are reportedly unaffiliated with any larger terrorist network. But going forward, how can law enforcement increase its ability to identify would-be terrorists operating below the radar? Experts point out that many terrorist groups like al Qaeda are increasingly decentralized, making them difficult to monitor and infiltrate. Experts also highlight the limited ability of the federal counterterrorism infrastructure to identify independent terrorist cells and lone wolf terrorists; the difficulty of identifying readers of extremist propaganda; and, most importantly, the challenges determining which individuals will turn to violent action. In this case, the FBI questioned Tamerlan Tsarnaev in 2011, possibly about his interest in extremist Internet propaganda or ties to Chechnya, but apparently lacked sufficient information to detain him further. With this in mind, how can law enforcement gain the intelligence necessarily to stop potential terrorists before they act? Congressman Peter King, Chairman of the House Subcommittee on Counterterrorism and Intelligence, has one proposal: he has renewed calls for increased surveillance of all Muslim communities. King asserts that this is the same practice used against Irish and Italian gangsters involved in organized crime. But that is simply not the case. Monitoring individuals suspected of involvement in organized crime is readily distinguishable from surveilling millions of American Muslims absent any reasonable suspicion criminal wrongdoing. Moreover, there is now significant consensus among most intelligence experts that profiling based on religious affiliation is ineffective because it is too widely shared a characteristic to be a shortcut for identifying those who might engage in violence. Furthermore, as civil liberties experts have long argued, profiling based on religion unnecessarily alienates communities that could potentially serve as important partners for law enforcement in countering terrorism. Rather than support Congressman King's approach, we believe the Boston tragedy offers lessons to improve our national security infrastructure but remain more consistent with our democratic values of justice, fairness, and human decency. In this case, it is now emerging from friends and associates of the Tsarnaevs that, upon reflection, they sensed something might have been amiss before the attacks. For example, Tamerlan Tsarnaev reportedly twice disrupted services at a local mosque. And there may be an additional trail of unusual speech or behavior -refusing to see friends or family, posting violent messages on the Internet, contemplating death -- that would have alerted family, friends or community members to something being out of place. But whom could they have alerted to these concerns? Could they have confidence that information shared with law enforcement would be discreetly and professionally handled? Could they be assured that police would not overreact, but would instead rationally determine if there were genuine issues requiring further investigation? For law enforcement to benefit from voluntary community intelligence they must create trust relationships allowing community members to articulate concerns that may or may not indicate an intention to engage in violence. This also means incorporating collaborative, long-term community-police partnerships into the national counterterrorism strategy. But partnerships are not easy to build. Partnerships are not achieved through coercion, force, or infiltration. They require voluntary engagement with communities through mutual trust and cooperation. This means winning the hearts and minds of communities so they become real partners in counterterrorism efforts and work collaboratively to address problems of common concern. Partnerships have already been piloted in domestic counterterrorism efforts, and have been used for years in cities like Dearborn, Los Angeles, and London. And beyond the counterterrorism context, partnerships have achieved success in reducing gang violence in cities like Boston and Glasgow, and drugs sales in places like High Point, North Carolina. It is by relying on common sense that the national security infrastructure can be expanded to address some of its current limitations. It is true that not all terrorist acts in the United States can be avoided, and unfortunately more will succeed. But by incorporating voluntary, partnership-based community intelligence gathering practices into our national security infrastructure, we can improve our chances of preventing some attacks. Terrorist attacks will escalate and kills billions Myhrvold 2014 (Nathan P [chief executive and founder of Intellectual Ventures and a former chief technology officer at Microsoft]; Strategic Terrorism: A Call to Action; cco.dodlive.mil/files/2014/04/Strategic_Terrorism_corrected_II.pdf; kdf) Technology contains no inherent moral directive—it empowers people, whatever their intent, good or evil. This has always been true: when bronze implements supplanted those made of stone, the ancient world got scythes and awls, but also swords and battle-axes. The novelty of our present situation is that modern technology can provide small groups of people with much greater lethality than ever before. We now have to worry that private parties might gain access to weapons that are as destructive as—or possibly even more destructive than— those held by any nation-state. A handful of people, perhaps even a single individual, could have the ability to kill millions or even billions. Indeed, it is possible, from a technological standpoint, to kill every man, woman, and child on earth. The gravity of the situation is so extreme that getting the concept across without seeming silly or alarmist is challenging. Just thinking about the subject with any degree of seriousness numbs the mind. The goal of this essay is to present the case for making the needed changes before such a catastrophe occurs. The issues described here are too important to ignore. Failing nation-states—like North Korea—which possess nuclear weapons potentially pose a nuclear threat. Each new entrant to the nuclear club increases the possibility this will happen, but this problem is an old one, and one that existing diplomatic and military structures aim to manage. The newer and less understood danger arises from the increasing likelihood that stateless groups, bent on terrorism, will gain access to nuclear weapons, most likely by theft from a nation-state. Should this happen, the danger we now perceive to be coming from rogue states will pale in comparison. The ultimate response to a nuclear attack is a nuclear counterattack. Nation states have an address, and they know that we will retaliate in kind. Stateless groups are much more difficult to find which makes a nuclear counterattack virtually impossible. As a result, they can strike without fear of overwhelming retaliation, and thus they wield much more effective destructive power. Indeed, in many cases the fundamental equation of retaliation has become reversed. Terrorists often hope to provoke reprisal attacks on their own people, swaying popular opinion in their favor. The aftermath of 9/11 is a case in point. While it seems likely that Osama bin Laden and his henchmen hoped for a massive overreaction from the United States, it is unlikely his Taliban hosts anticipated the U.S. would go so far as to invade Afghanistan. Yes, al-Qaeda lost its host state and some personnel. The damage slowed the organization down but did not destroy it. Instead, the stateless al-Qaeda survived and adapted. The United States can claim some success against al-Qaeda in the years since 9/11, but it has hardly delivered a deathblow. Eventually, the world will recognize that stateless groups are more powerful than nation-states because terrorists can wield weapons and mount assaults that no nationstate would dare to attempt. So far, they have limited themselves to dramatic tactical terrorism: events such as 9/11, the butchering of Russian schoolchildren, decapitations broadcast over the internet, and bombings in major cities. Strategic objectives cannot be far behind. 1ac Plan + Solvency Plan: The United States federal government should prohibit its domestic surveillance based on race, religion, ethnicity, national origin, or First-Amendment-protected activity in the absence of at least reasonable suspicion of criminal activity, except in situations involving a serious risk of imminent violence, and require the least restrictive means be employed when conducting criminal intelligence investigations. The plan would eliminate virtually all past abuses and focus resources on meaningful terror investigations Fisher, 4 --- Associate Professor of Law and Director, Center for Social Justice, Seton Hall Law School (Winter 2004, Linda E., Arizona Law Review, “Guilt by Expressive Association: Political Profiling, Surveillance and the Privacy of Groups,” 46 Ariz. L. Rev. 621, Lexis, JMP) C. Weighing the Associational and Government Interests in Political Surveillance When assessing whether political surveillance is warranted, the need for political surveillance should be weighed against the associational harms likely to occur. The NAACP Court's requirement of preserving group privacy when revelation of identity is likely to cause significant harm, in conjunction with the Dale Court's deference to groups' own definitions of what would seriously harm their message, creates a strong counterbalance to the government's need to ferret out terrorists, requiring restraints on investigations lacking a reasonable basis. 1. Compelling State Interests and the Reasonable Suspicion Presumption In the political surveillance context, the application of balancing should result in a threshold presumption: a particular situation will be presumed not to involve a sufficiently compelling state interest if there is no reasonable suspicion of criminal activity before a full investigation of First Amendment activity is conducted. n221 Criminal activity should be defined to exclude minor offenses such [*662] as violations of municipal ordinances, technical misdemeanors - such as minor traffic code offenses - or technical immigration offenses. n222 If there is no indication of unlawful activity, full investigations are not permitted; the presumption is irrebuttable, although I also propose an emergency exception. This standard is an appropriate alternative to political or religious profiling, as it permits legitimate law enforcement while disallowing investigations based purely on politics, which contravene the First Amendment. Its deployment would eliminate virtually all of the abuses that have occurred in the past, as detailed in Section I, supra. At the same time, terrorism investigations that focus on meaningful evidence of terrorism can proceed unimpeded. This presumption also represents a conclusion that political surveillance will, on balance, be harmful and intrusive with an insignificant likelihood of gain in useful intelligence if the initial evidentiary standard is not met. n223 Stated differently, the general compelling state interest in investigating terrorism does not exist sufficiently in a particular case when evidence of criminality is lacking; mere suspicion or political profiling cannot justify intrusions into a group's private affairs. Thus, the generalized compelling need to uncover terrorist activities does not constitute a sufficient reason to surveil a particular mosque unless there is a reasonable suspicion of criminality at that particular mosque, such as that the imam preaches extremist doctrine and raises funds for what appears to be an affiliate of a terrorist organization. n224 It is not acceptable to investigate and compile dossiers on all mosques holding radical views, even if the surveillance is limited to mosques whose members come from countries that have produced terrorists, such as Saudi Arabia. n225 The standard of reasonable suspicion for political surveillance is similar to, and borrowed from, the Fourth Amendment standard employed in criminal [*663] procedure n226 to determine the constitutionality of a stop-and-frisk situation. I adopt it here because it provides a suitable delineation point between political surveillance and legitimate law enforcement. In order for a stop-and-frisk investigation to be lawful, a police officer must "reasonably ... conclude in light of his experience that criminal activity may be afoot" n227 and "point to specific and articulable facts which, taken together with rational inferences from those facts, reasonably warrant" a search. n228 Recognizing the public safety interest in thwarting crimes before they occur, this standard is lower than the probable cause standard required for a police officer to actually make an arrest. n229 What constitutes reasonable suspicion in a particular situation depends upon "whether a reasonably prudent [person] in the circumstances would be warranted in the belief that his safety or that of others was in danger." n230 While this is a somewhat nebulous determination, reasonable suspicion never exists based on mere "hunches" or general suspicion. n231 Rather, police "must have a particularized and objective basis for suspecting [that] the particular person" being investigated has committed or plans to commit a crime. n232 In a First Amendment context, the standard should not be interpreted identically to the reasonable suspicion standard employed in a pure Fourth Amendment situation where no expressive activity is involved. Courts have developed a number of "special needs" exceptions to the pure Fourth Amendment [*664] standard. n233 Those exceptions must be limited where First Amendment rights are implicated, because most courts likely would consider prevention of terrorism a "special need" in situations not involving First Amendment expression. In order to preserve fragile First Amendment rights, the scope of the exceptions should be confined. Further, even if the Fourth Amendment's special needs doctrine applies, the existence of a special need is not always dispositive. In some respects, this situation is analogous to that in Ferguson v. City of Charleston, n234 one of the Supreme Court's most recent pronouncements on the special needs exception. In that case, the Court balanced the state interest in conducting drug testing on pregnant women to prevent fetal drug abuse against the women's interest in avoiding dissemination of personal - and potentially incriminating information to law enforcement. Striking down the drug testing policy, the Court held it unconstitutional because "the gravity of the threat alone cannot be dispositive of questions concerning what means law enforcement officers may employ to pursue a [*665] given purpose." n235 A policy designed to obtain information for criminal prosecution by means of nonconsensual drug-testing is draconian. Analogously, the fundamental right to engage in First Amendment-based association should override the State's interest in having free rein to monitor all group activity whenever any suspicion of terrorism arises. Given the risk of misuse of religious and political information, as well as of disruption of organizational functioning, the end does not justify the means. n236 There is ample precedent for adopting a reasonable suspicion of criminality standard for political surveillance. This standard remains as a requirement for police departments accepting federal aid. n237 Its substantial equivalent was successfully employed in the FBI's domestic surveillance guidelines for over twenty-five years. n238 It was also incorporated into the Chicago Red Squad consent decree. n239 The Church Committee endorsed the reasonable suspicion standard as a predicate for terrorism investigations in 1976. n240 Notably, it was recently adopted in the Denver police spying consent decree. n241 And it was enacted in a Seattle ordinance. n242 Other political surveillance litigation was not as [*666] successful. n243 However, the Dale Court's affirmation of a robust right of association strengthens and reinforces those First Amendment arguments previously available. Additionally, reasonable suspicion is a relatively lenient evidentiary standard that allows legitimate law enforcement activity. n244 Absent even this indicia of crime, it is difficult to imagine - outside of an imminent threat of serious violence - how the government could present a state interest sufficiently compelling to ever outweigh harm to First Amendment rights. A lower standard would unduly interfere with the integrity of associations and contravene the Supreme Court's many pronouncements concerning the centrality of associational rights to preservation of the First Amendment. n245 And the standard does not apply at all to investigations not based on First Amendment conduct, such as investigation of an individual because of his purchase of explosives. Indeed, one could readily question whether the reasonable suspicion standard is sufficiently high to deter excessive, unnecessary surveillance. But the need to investigate terrorism where evidence of crime exists does not permit imposition of a higher standard, such as probable cause. n246 The purpose of the investigation is to obtain probable cause. That standard is the result of an investigation, rather than its predicate. While the reasonable suspicion standard is a relatively low threshold, it is effective. The history of political surveillance reveals that almost all of the abuses could have been avoided had a reasonable suspicion threshold been observed. n247 Requiring reasonable, articulable evidence of crime prevents investigations based [*667] on pure politics, mere whim, or baseless suspicion. n248 Its use should practically eliminate political profiling. In opposition to this standard, Attorney General Ashcroft argues that only an investigation can uncover evidence, and that a standard requiring prior evidence therefore undermines law enforcement by prohibiting the very process that compiles relevant evidence in the first place. n249 His logic is superficially appealing, but ultimately unpersuasive; in reality, surveillance is only conducted when a reason or suspicion triggers it. Resource limitations prevent either random or total surveillance; thus, investigations are begun for a reason. Historically, illegitimate reasons such as dissident political views have frequently triggered investigations. n250 By contrast, this standard requires that the inevitable triggering reason must reasonably relate to criminal behavior. [*668] Finally, in certain circumstances where the need is exceptionally compelling, brief preliminary inquiries using a lower threshold may be conducted. True terrorist emergencies may occasionally necessitate immediate investigation of First Amendment conduct with less than an individualized reasonable suspicion of crime. n251 I propose the standard recommended by the Church Committee: "The FBI should be permitted to conduct a preliminary preventive intelligence investigation ... where it has a specific allegation or specific or substantiated information that the [subject(s)] will soon engage in terrorist activity." n252 Where the First Amendment is implicated, exceptions to the reasonable suspicion threshold should be limited to situations involving a serious risk of imminent violence, to avoid swallowing the reasonable suspicion threshold with an exception invoked any time an officer suspects terrorism. n253 The need to protect First Amendment activity requires the qualification, as well as durational limits and approval by high-ranking personnel. n254 [*669] Advocacy of specific terrorist violence in the U.S. could meet the terrorist emergency definition in some situations and lead to a preliminary inquiry, but only to determine if the advocacy constitutes a real threat. To hold otherwise would disable law enforcement from dealing with the likely prospect of severe and imminent danger solely because First Amendment activity is involved. It is important, however, that this exception be limited by additional restrictions to ensure that the emergency authority is not misused. For instance, use of infiltrators or electronic surveillance could be prohibited. n255 The underlying principle is that the intrusiveness of the inquiry must be proportional to the threat presented. Attorney General Ashcroft's objection to a reasonable suspicion predicate arises against the backdrop of the larger shift in the FBI's mission from investigation of crime to prevention of terrorism. n256 Writ large, the claim can be restated as an objection to transferring a standard born of a policing model that focuses on gathering evidence of a completed - or ongoing - crime to a context that requires preventive investigation before a terrorist act occurs. n257 Is a standard adopted in a street-crime context really suitable for the new era of global terrorism? Might not an intelligence-gathering model be more appropriate? This objection is not warranted, however, because the reasonable suspicion standard can be incorporated into a policing model that focuses on collecting intelligence to prevent ongoing or future crimes. Although it arose in a stop-and-frisk case, its application is not limited to that context, as the Church Committee recognized in 1976. n258 Terrorist organizations are criminal enterprises. [*670] The purpose of their existence is to commit politically motivated crimes; thus, their criminal conduct is ongoing. And even if a suspected terrorist cell is involved solely in planning or supporting a future crime - such as an act of domestic terrorism - the reasonable suspicion standard allows investigation of conspiracies in the planning stage. n259 For instance, a reasonable suspicion of conspiracy to commit terrorist acts would exist when the suspects are affiliated with a group that espouses jihad against anti-Muslim aggressors and one of them purchases materials that could be used to make bombs. n260 Thus, the reasonable suspicion requirement permits the government to investigate members of a terrorist organization early enough to prevent terrorist attacks. n261 What it does not allow is investigations based on political or religious beliefs rather than apparently unlawful behavior. We should not abandon a proven standard that protects the constitutional rights of U.S. persons in domestic surveillance contexts because intelligence-gathering may also be involved. The reasonable suspicion standard merely mandates a link between the investigation and crime, including ongoing or imminent crimes. Because the scope of criminal statutes addressing terrorism is broad, it is likely that evidence of crime will exist when it is prudent to conduct surveillance of potential criminal activity. n262 For example, a reasonable suspicion [*671] of crime exists to investigate a suspect when he claims the September 11 attacks were justified and holds a commercial drivers license for hazardous materials. The reasonable suspicion standard does not, however, give carte blanche to investigators to conduct surveillance of the suspect's associates or groups to which he or she belongs. In order to avoid overly broad investigations, the subject's associates cannot be fully and independently investigated without a reasonable suspicion that they are also involved in crime. Because groups themselves have a right to associational privacy, n263 an investigation of an individual group member cannot expand (beyond a brief initial inquiry if the situation qualifies as an emergency) to cover the entire group unless the individual is in a sufficiently high leadership position to act as the association's alter ego, or unless an initial inquiry reveals evidence of the group's involvement in crime. n264 Having an institutionalized procedure for approving surveillance under the reasonable suspicion standard also helps ensure that officers do not make erroneous ad hoc decisions. n265 The standard also does not permit political profiling, since a person or group's political beliefs - other than specific advocacy of crime - do not in themselves create a reasonable suspicion. For instance, a general endorsement of violent jihad in defense of Muslim lands is abstract advocacy and unrelated to a U.S. crime. On the other hand, the threshold could be crossed by a combination of abstract political beliefs and other evidence, even if the evidence consisted only of First Amendment conduct. n266 For instance, belonging to a political or religious [*672] group that espouses violent revolution generally and personally endorsing violence against a particular local target could create a reasonable suspicion. (Indeed, in certain circumstances it could create probable cause.) Although one may not be prosecuted for expressions that involve advocacy of violence unless there is incitement to immediate violence and likelihood of its occurrence, n267 criminal investigations may be initiated on a lesser standard. In this example, solely First Amendment activity is involved, but the individual, targeted endorsement could lead a reasonable person to conclude that a violent crime could occur absent intervention. n268 Only an investigation could establish whether that was the case. 2. Associational Interests and the Least Restrictive Means of Investigation Even when a reasonable suspicion exists, associational interests must be further taken into account before the constitutionality of surveillance can be determined. The reasonable suspicion presumption will not always be dispositive, such as where overly intrusive investigative methods are used. n269 The least restrictive means required to conduct the investigation effectively must be [*673] employed. Otherwise, unnecessary harm that is not justified by a compelling state interest accrues to the organization. n270 In the case of surveillance against mosques and other Islamic organizations, many methods of surveillance can seriously hinder Islamic practice and expression. Investigations involving intrusive methods, such as infiltrators who influence organizational practices and issue detailed reports containing First Amendment information, ordinarily will hinder religious practices. n271 In some cases, however, less intrusive means, such as voluntary interviews, could be effective. To the extent possible, interviews should be conducted without probing political or religious beliefs. Potential interviewees may agree to be interviewed or not; therefore, privacy is not invaded if the interviews are truly voluntary. n272 By contrast, the clandestine nature of most surveillance precludes consent. If an intrusive investigative method does not serve the needs of the investigation, it is not the least restrictive alternative. For example, while government may have a reasonable suspicion regarding a suspected member of a terrorist organization, the government's interest is not served by disrupting his mosque's operations or harassing other members. Nor is it served by investigating an entire Islamic center's activities because an associate of a suspected terrorist has [*674] prayed there. To avoid unnecessary harm to associational rights, investigative methods should be narrowly tailored to fit the need. n273 On the other hand, surveillance would be justified if the least restrictive means were employed, and it was initiated based upon the reasonable suspicion standard. By contrast, using infiltrators who attend and influence private meetings should not be permitted except where other investigative means are ineffective to address a serious potential crime. Conclusion Recently, some commentators have queried whether September 11 was a constitutional moment - a term coined by Bruce Ackerman to refer to decisive historical events that usher in a new paradigm of constitutional interpretation. n274 Instead, I would suggest that September 11 was a crisis that requires renewed fidelity to the enduring core values of American constitutionalism, including scrupulous protections of First Amendment freedoms. n275 Rather than lift all restraints on law enforcement, it is critical in the current period that we retain reasonable restrictions that simultaneously allow legitimate investigation into terrorist activity and protect the constitutional rights of those wrongly targeted for political surveillance. Undoubtedly, the September 11 attack demonstrated that the threat of terrorism in the U.S. is greater than many believed. But the pressing need to investigate suspects to prevent future terrorist attacks can coexist with protection of basic civil liberties. It serves neither the interests of protecting constitutional rights nor those of devising effective law enforcement tactics to profile, monitor, and investigate U.S. persons based on general political or religious belief. Throughout American history, threats to national security have resulted in violations of civil liberties that did nothing actually to increase our security. [*675] The Constitution requires that political surveillance only be initiated based upon an individualized reasonable suspicion of involvement in crime, with exceptions only for true emergencies. In the absence of this predicate, we will only diminish our democratic freedoms and look back at the current era with the dismay that hindsight will bring. n276 The plan would provide the best safeguard against government abuses and resolve the problem of informants Berman, 11 --- Counsel in the Liberty and National Security Project at the Brennan Center for Justice (Emily, “DOMESTIC INTELLIGENCE: NEW POWERS, NEW RISKS,” http://brennan.3cdn.net/b80aa0bab0b425857d_jdm6b8776.pdf, JMP) Substantive Recommendations Regardless of what additional procedural protections are implemented, some elements of the FBI’s existing powers simply permit too much government intrusion into the lives of innocent Americans and therefore should be curtailed in the following ways: 1. Prohibit the FBI from using highly intrusive investigative techniques unless there is some basis in fact to suspect wrongdoing.290 • This would prohibit tailing someone, posing as other people in order to mine information from neighbors and acquaintances, and recruiting informants to glean more information in the absence of some factual basis for suspicion. • This prohibition, summarily overturned by the 2008 Guidelines, was enshrined in all previous iterations of the Guidelines for decades. It is the single most important safeguard against profiling and other forms of abuse, and the government has offered no persuasive justification for its sudden disappearance. 2. Require agents to use the least intrusive investigative technique that is likely to prove effective. • The “least intrusive method” requirement has been part of the Guidelines since their inception. The current, equivocal language on this requirement in the Guidelines and the DIOG should be amended to stress its importance, even in terrorism investigations. 3. Prohibit improper consideration of race, religion, ethnicity, national origin, or First-Amendment-protected activity in investigative decisions. • Addressing this issue is most urgent in the context of rules regarding use of informants to collect information about First-Amendment-protected activity, such as infiltration of a place of worship or political gathering. Such activities should require higher levels of predication and more aggressive oversight of investigative decisions than activities that do not implicate Americans’ constitutional rights. • Even outside the First Amendment context, however, reform is necessary. One standard to consider was recently implemented by the Office of the Director of National Intelligence (DNI). The standard for use in the DNI’s Information Sharing Environment (ISE)-Suspicious Activity Reporting (SAR) system adopts a “behavior-focused approach to identifying suspicious activity” based on the standard announced in Terry v. Ohio,291 392 U.S. 1 (1968). It requires that “race, ethnicity, national origin, or religious affiliation should not be considered as factors that create suspicion (except if used as part of a specific suspect description).”292 This type of limitation on the use of these factors to justify law enforcement activity is crucial. Conclusion The time to act is now—before the Guidelines result in widespread and unwarranted intrusions into Americans’ privacy, harmful religious and ethnic profiling, and the divergence of scarce resources to ineffective and indiscriminate collection of information. The changes recommended above will go a long way to reduce the risk of excesses that the current Guidelines permit. They would reinvigorate the substantive standards on which investigative activity should be predicated and would ensure that intrusive investigative methods are used only when necessary. And they would impose internal and external checks to guarantee the lawful, effective use of the powers conferred on federal agents. In short, they would safeguard Americans’ rights of privacy, free expression, association, and religion as well as help to focus investigative activity where there are indications of threats. The result will be a safer, more just America. The plan is necessary to set firm limits on criminal intelligence investigations --chance of circumvention is a reason to support tougher restrictions Berman, 11 --- Counsel in the Liberty and National Security Project at the Brennan Center for Justice (Emily, “DOMESTIC INTELLIGENCE: NEW POWERS, NEW RISKS,” http://brennan.3cdn.net/b80aa0bab0b425857d_jdm6b8776.pdf, JMP) Another proffered justification for the Mukasey Guidelines is that a consolidation of multiple sets of Guidelines and a harmonization of their rules was necessary to resolve inconsistencies and to reduce confusion among agents.260 According to this argument, an investigation is an investigation, and the rules should not differ depending on whether the investigation is conducted in order to solve a crime or to gather intelligence. But the Guidelines were developed to require different standards in different contexts for a reason. The purpose for which an investigation is initiated, the amount of evidence that the feared harm is imminent, the possible harm involved—all are arguably relevant to what sort of action the FBI should be permitted to take. In short, context matters. And a one-size-fits-all investigative approach, while appealing for its administrative simplicity, is not the way to pursue all of the FBI’s many goals—solving crimes, preventing crimes, protecting civil liberties, collecting valuable foreign intelligence—most effectively. Take, for example, the difference between investigations of general crimes and criminal-intelligence investigations. Investigations of general crimes tend to end with a decision to prosecute or not to prosecute. As the Guidelines historically have acknowledged, they are consequently more circumscribed in scope and tend to be shorter in duration than intelligence investigations.261 In intelligence investigations of criminal organizations, by contrast, the organization provides a life and continuity of operation that are not normally found in a regular criminal activity. As a consequence, these investigations may continue for several years. Furthermore, the focus of such investigations ‘may be less precise than that directed against more conventional types of crime. . . . For this reason the investigation is broader and less discriminate than usual.’”262 Accordingly, durational limits on general crimes investigations have been shorter than those for intelligence investigations. Similarly, earlier iterations of the Guidelines precluded the use of preliminary inquiries in the criminal intelligence context, requiring evidence to reach the level of a “reasonable indication” of relevant activity before permitting the FBI to initiate investigative activity. This distinction is sensible when viewed in context. General crimes investigations have a close nexus to the commission of a particular crime. Intelligence investigations, on the other hand, are more undefined; there is no specific crime “to provide a framework for the investigation,”263 which increases the risk that they will be undertaken without sufficient basis or will include information about law-abiding citizens. Moreover, general crimes investigations are conducted with relative transparency, whereas intelligence investigations are, as a rule, conducted in secret. Exposing the ways in which a power is exercised provides a natural check on its abuse. This natural check exists in the criminal context in ways that it does not for intelligence investigations. Introducing evidence secured through a wiretap or a “sneak and peek” search in a criminal trial provides an opportunity for the validity of that wiretap and that search to be challenged by a criminal defendant. The target of a wiretap or a search in an intelligence investigation, on the other hand, may never even know about the investigation, much less have a chance to challenge its legitimacy. Consider the 2004 incident in which an FBI Joint Terrorism Task Force requested grand jury subpoenas to be issued to Drake University and several anti-war protesters seeking records regarding the purpose of and attendance at an anti-war gathering that had taken place on the Drake campus.264 When news of the subpoena became public, the ensuing outrage prompted the subpoenas to be withdrawn.265 By contrast, when the government requests information as part of an intelligence investigation, through NSLs or so-called “business records” requests, “[n]o person shall disclose to any other person” the fact that the request was made.265 Only the recipient of such requests can challenge their legitimacy. Publicity can provide no check on misuse of the power. Notably, in each instance in which an NSL has been challenged, it has been withdrawn.267 Under the circumstances of intelligence investigations, keeping the FBI on a tighter rein, avoiding a freeranging investigation before there is a reasonable indication of criminal activity, represents a logical precaution and reduces the risk that law-abiding Americans will be subject to undue intrusions into their privacy. As one intelligence expert put it, “[b]ecause the safeguards against overreaching or abuse are weaker in intelligence operations than they are in criminal investigations, powers granted for intelligence investigations should be no broader or more inclusive than is absolutely necessary” and they “should be accompanied by rigorous oversight by Congress, and where appropriate, by the courts.”268 The fact that a particular activity under a particular level of supervision is permitted in the criminal context is thus not necessarily justification for employing that same tactic in the intelligence-collection context. Of course, some investigations might appropriately be labeled as falling under more than one investigative category. Investigations into an international terrorist organization’s U.S. activities, for example, would qualify as a foreign intelligence, criminal intelligence, and general crimes investigation all at once. In such circumstances, the FBI should have the discretion and flexibility to employ the framework that most makes sense given the facts of the case. But the simple fact that some investigations might transcend an easy label is no reason to jettison merely for convenience’s sake the rules that developed—for good reasons—to apply different standards in different contexts. The alleged differences among various sets of guidelines have also been described as “problematic from a compliance standpoint.”269 In other words, rather than teach agents to operate in compliance with existing guidelines, the guidelines should be changed to make compliance easier. It is certainly true that the FBI has a history of spotty compliance with the rules to which it is subjected. From the use of confidential informants to National Security Letters and beyond, the FBI has shown time and again that it struggles to comply with restrictions imposed upon it. A 2005 report by the Justice Department’s Inspector General, for example, revealed that agents failed to secure the proper authorization for the use of confidential informants270 and the initiation or extension of investigations,271 and failed to maintain the required documentation regarding agents’ visits to public gatherings and events. 272 A 2007 internal review of the FBI’s use of National Security Letters (NSLs) unearthed a host of problems, including erroneous reports to Congress regarding the use of NSLs,273 the fact that 22 of 77 files examined contained violations of the rules governing NSLs,274 and the fact that the FBI circumvented requirements of NSL authorities or issued NSLs in violation of FBI policy and the Attorney General’s guidelines for FBI National Security Investigations.275 More recently, the Inspector General issued a scathing report documenting the FBI’s systemic use of unlawful means of acquiring thousands of telephone records over the course of several years, as well as its “ineffective” post hoc efforts to justify this breach of law and policy.276 And a September 2010 report from the Inspector General, prompted by media reports suggesting that the FBI had targeted organizations for investigation on the basis of First-Amendment-protected activity found “troubling” results. While not motivated by groups’ expressive activities, across a range of investigations, agents improperly collected and retained information; initiated investigations with insufficient justification; and labeled as “terrorism investigations”—thereby making available additional powers—matters having nothing to do with what most Americans would consider terrorism.277 On several occasions they also permitted investigations to continue far beyond the point at which they should have been closed, improperly keeping the targets of these investigations on watch lists, allowing the government to track their travel and investigate their associates, for years.278 And most recently, the Inspector General reported the agents cheated on the exam designed to test their knowledge of the rules by which they must comply.279 The solution to compliance problems, however, is not to eliminate the rules that are being broken. It is true that guidelines imposing minimal constraints are more likely to produce stellar compliance levels. But recall that in the pre-Guidelines era an unfettered, unconstrained FBI embarked on surveillance, intelligence, and investigative activities so objectionable that Congress nearly enacted statutory limits. It was these types of abuses that the Guidelines were imposed to prevent, and it is the risk of these types of abuses that continues to demand meaningful Guidelines. Indeed, if the FBI can be expected to continue its tendency to operate beyond the scope of its authorities from time to time, all the more reason to tailor those authorities as narrowly as possible. The FBI’s history of overreaching in the course of well-intentioned efforts to fight crime and protect national security argues for more robust constraints, not fewer. As one member of Congress put it when assured by FBI Director Mueller that the FBI would not abuse the authorities extended to it, “We understand your assurances. We’ve heard them before. And that is why we are skeptical.”280 With regard to the specific complaint that different standards for different types of investigations causes confusion among agents, the response is simple: law enforcement officials operate under different standards depending on the investigative context in all manner of ways. They may make a felony arrest in a public place with no warrant, but they must secure a warrant to make an arrest inside a home.281 When arresting the driver of a car, they may search the car’s interior, but they may not search the trunk unless they have probable cause to do so.282 Officers may enter a private home with no warrant when exigent circumstances require it, but not under normal circumstances.283 All of these rules—and many, many more imposed on the activities of law enforcement officers by statute or by the Constitution—obligate officers to learn the rules and apply them to different factual situations. If agents feel they need legal advice to execute this obligation, they should be encouraged or required to work in tandem with the appropriate U.S. Attorney’s office, as they often do in run-of-the-mill criminal investigations. The existence of circumstance-based distinctions in the Guidelines for the FBI’s investigative activity should not pose an insurmountable practical obstacle to effective law enforcement. One reason offered by the former Attorney General for the changes in Guidelines is, however, spot-on. “These new guidelines,” said Michael Mukasey, will “reflect that the FBI is an intelligence agency.”284 In short, the FBI wants the authority—the freedom—to collect, at will, all available information, using an arsenal of highly intrusive investigative tools. In that regard, it seeks to eliminate any “distinction in the Bureau between law enforcement and intelligence.”285 This authority may be sought for the most noble of purposes, to protect our Nation from threats to its security. But in granting this power without sufficient constraints on its use, we forget the lessons of history and expose ourselves to equally ominous threats: threats to our freedom, to our privacy, and to the values that make the Nation worth defending. This was the conclusion of the Church Committee faced with the Cold War’s threat of nuclear holocaust in 1976. Our conclusion today, faced with the threat of extremist violence, should be no different. Case SQ => No Reasonable Suspicion FBI maintains a policy of total surveillance of Muslims --- whole populations are treated as suspects without any reasonable suspicion and it doesn’t prevent terrorism. Gosztola, 15 (3/25/2015, Kevin, “9/11 Review Commission Suggests FBI Expand Spying on Entire Racial or Ethnic Communities,” http://firedoglake.com/2015/03/25/911-review-commission-suggests-fbiexpand-spying-on-entire-racial-or-ethnic-communities/, JMP) A 9/11 Review Commission report on the Federal Bureau of Investigation’s efforts to implement recommendations the commission issued in the aftermath of the September 11th attacks was released. One of the report’s key aspects is how it suggests the agency should expand its domestic spying operations on entire racial or ethnic communities in the United States in order to fight terrorism The report [PDF] was put together by commissioners Bruce Hoffman, former adviser on counterinsurgency for the Multi-National Forces in Baghdad, Edwin Meese III, former attorney general under President Ronald Reagan implicated in the Iran-Contra and arms-for-hostages scandals, and Timothy J. Roemer, former Democratic congressman. They do not describe the FBI’s conduct as domestic spying, but, if one understands the jargon the FBI employs for its operations, it is clear what the commission advocates. “Domain awareness” is the analyzing of racial, ethnic or religious groups. FBI analysts are looking for individuals, who are likely to radicalize and commit terrorism. It involves treating whole populations, like Muslims, in parts of cities as potential suspects even when there is no reasonable suspicion to believe they will plot attacks More concisely The report describes how critical this “cornerstone” or “centerpiece” has been to the “transformation” of the FBI into a national security agency Documents the American Civil Liberties Union have been able to obtain show [PDF] that “FBI analysts make judgments based on crude stereotypes about the types of crimes different racial and ethnic groups commit, which they then use to justify collecting demographic data to map where people with that racial or ethnic makeup live.” The FBI uses “domain analysis” to target American Muslims and Islamic institutions. [*A federal judge recently ordered the release of more documents.] As the ACLU argued in its 2013 report on the “FBI’s unchecked abuse of authority”: …[A] Detroit FBI field office memorandum entitled “Detroit Domain Management” asserts that “[b]ecause Michigan has a large Middle-Eastern and Muslim population, it is prime territory for attempted radicalization and recruitment” by State Department-designated terrorist groups that originate in the Middle East and Southeast Asia. 92 Based on this unsubstantiated assertion of a potential threat of recruitment by terrorist groups on the other side of the world, the Detroit FBI opened a “domain assessment” to collect and map information on all Muslims and people of Middle-Eastern descent in Michigan, treating all of them as suspect based on nothing more than their race, religion, and national origin. Collecting information about the entire Middle-Eastern and Muslim communities in Michigan is unjust, a violation of civil rights and an affront to religious freedom and American values. It’s also a surprisingly ignorant approach for an intelligence agency, because it ignores the fact that many Michigan Muslims are not Middle Eastern or South Asian… This type of FBI activity is apparently the “cornerstone” or “centerpiece” of the agency in the post-9/11 era. The totalitarian nature of the FBI’s expansion and reliance on this type of domestic spying on communities is fully communicated in this Orwellian paragraph, where the homeland is mentioned twice (with a capital “H”): One might recall, in 2014, Attorney General Eric Holder announced “new rules” intended to prevent FBI agents from using racial profiling in “national security cases.” Race and ethnicity would supposedly no longer be allowed to be considered when opening a case. But none of those rules affected the widespread practice of “domain awareness” or total surveillance of entire communities. 9/11 Review Commission Acknowledges Spying on Entire Communities Didn’t Stop a Terrorist What makes the advocacy for expansion of domestic spying operations (or the FBI’s euphemism, “domain awareness activities”) even more incredible is the section of the report on five cases the commission examined. Commissioners looked at how the FBI handled Najibullah Zazi, David Headley, Nidal Hasan, Faisal Shahzad, and Tamerlan and Dzhokhar Tsarnaev. [See below for the Commission’s own brief description of each of the cases.] [Image omitted] Another euphemism for spying that the FBI employs, “community outreach” or just “outreach” appears here. What this refers to is FBI infiltration of the very communities, which are the subject of “domain awareness.” Informants or “confidential human sources” are deployed as part of HUMINT or human intelligence gathering. (It’s domestic spying.) No FBI office was ever aware that Zazi and his associates were planning to travel to New York to launch an attack after they traveled to Pakistan and trained with al Qaeda. It took tip from outside the FBI to trigger an investigation. “Moreover, the FBI’s outreach into the Afghan and Pakistani communities in Denver and New York did not result in a community member providing information or intelligence on Zazi or his associates,” the commission notes. In other words, the FBI had agents who infiltrated and were spying on Afghans and Pakistanis in Denver and New York and none of those operations helped the FBI stop a terrorist plot. But, still, the 9/11 Review Commission seems to favor expanding the surveillance of entire communities. “Broader domain awareness,” commissioners contend, “might have detected [Tehrik-e-Taliban Pakistan] plots in the United States and perhaps Faisal Shahzad would have been identified before his attempted plot to detonate a bomb.” Considering the agency’s stunning failure to stop Hasan, the commission calls for “accelerating the further development and refinement of an agile strategic intelligence program incorporating both HUMINT and domain awareness to identify individuals susceptible to being radicalized like Hasan, while preserving protections for First Amendment activities.” The commission laments the fact that information about Tamerlan Tsarnaev having outbursts during sermons at the Islamic Society of Boston Cultural Center in Cambridge in November 2012 and January 2013 was not reported to the FBI: The commission is essentially is saying if Boston had a larger network of informants in Islamic institutions it would have been able to know that Tamerlan was engaged in behavior the agency now sees as evidence of radicalization and a sign he might commit an attack. Commissioners casually acknowledge that having a network of informants in mosques or cultural centers is problematic but shrug it off. Yet, plenty of people could get angry during sermons and never do what Tamerlan did. This just calls attention to the flawed understanding driven by stereotypes, which the government endorses when proposing policies like this to address radicalization “None of the five cases benefited from intelligence acquired through FBI recruited sources,” the commission found. Such a conclusion suggests the FBI’s efforts at total information awareness are hampering the ability to detect and thwart the very few individuals, who decide to plot actual terrorism in the United States. Celebrating FBI’s Authority to Target People Who Will Likely Never Be Suspects of Criminal Investigations Furthermore, the commissioners celebrate the revision of Attorney General guidelines for domestic FBI operations on October 1, 2008. The revisions by Attorney General Michael Mukasey were in response to FBI concerns that “certain restrictions” were “actively interfering” with the agency’s ability to “become an intelligence-driven agency capable of anticipating and preventing terrorist and other criminal acts as well as investigating them after they are committed.” Here’s what the 9/11 Review Commission likes about these guidelines: [Image omitted] The commission claims that the guidelines “carried over substantial privacy and civil liberties protections from earlier investigative guidelines,” but the ACLU’s report from 2013 shows these guidelines gave the FBI a new power to conduct something called an “assessment,” which the commission mentions in the above paragraph. During assessments, FBI agents can “establish any factual predicate before initiating investigations so long as they claim their purpose is to prevent crime or terrorism or protect national security.” FBI agents are able to engage in “physical surveillance,” retrieve data from “commercial databases,” deploy informants, engage in “pretext” interviews where FBI misrepresent their identities and “use grand jury subpoenas to collect subscriber information from telecommunications companies.” These “assessments,” according to the ACLU, may be done to determine if a person may make a good FBI informant. (Note: Multiple American Muslims have sued heads of the FBI because they claim agents threatened to put them on the “No Fly List” if they refused to become informants. So, this part of the “assessment” may possibly be coercive and threatening.) Agents also can collect identifying information, telephone numbers, email addresses, current and previous addresses, current employers and job titles, travel history, whether the person has “special licenses or permits” or “specialized training” and whether the person has purchased a weapon. All of this personal information can be shared among agencies, whether that person is innocent and not the subject of an investigation. In August 2011, the New York Times reported the FBI had opened 82,325 assessments on individuals or groups between March 2009 and March 2011. Only 3,315 of them led to preliminary or full investigations. And, for a stage that the commission contends is so invaluable to the FBI, it sure leads to a small percentage of actual investigations. However, with all these widespread domestic spying operations in racial or ethnic communities of the United States, it is not difficult to see how nearly 95% of terrorism-related cases from 2001-2010 contained elements of preemptive prosecution. The FBI or local law enforcement targeted and prosecuted individuals or organizations because their beliefs, ideology or religious affiliation raised “security concerns” in 376 instances. Preemptive prosecutions include the FBI giving mentally ill Muslims the means, opportunity and the desire to commit plots because the agency decides if it does not orchestrate its own terrorism plot with this person then al Qaeda or some other group might connect with that person to launch an attack. The agency manufactures its own terrorists by taking advantage of their economically desperate situations and using paid informants to manipulate them into planning terrorism activity. None of this conduct, which the FBI has a long history of carrying out in Muslim communities, is troubling to the 9/11 Review Commission. The disruptive nature of sting operations, which seem to revive COINTELPRO practices from the days of J. Edgar Hoover, do not bother the commissioners. FBI conducts “assessments” without any suspicion of criminality --- includes use of informants Berman, 14 --- Visiting Assistant Professor of Law, Brooklyn Law School (Winter 2014, Emily, Washington & Lee Law Review, “Regulating Domestic Intelligence Collection,” 71 Wash & Lee L. Rev. 3, Lexis, JMP) The 2008 Mukasey Guidelines also expanded the Bureau's collection powers to further its preventive mission-both with respect to what information it is permitted to collect and what tactics it may employ in that collection. The most significant of these expansions is the authorization of "assessments"--a new investigative stage. Assessments, which are inquiries designed to determine whether further investigation is warranted, require only an "authorized purpose," meaning that the FBI must merely determine that it is acting to protect against criminal or national-security threats, or to collect foreign intelligence. n50 There is no need for any concrete facts, evidence, or reason to believe that the subject of an assessment is involved in criminal or threatening [*19] activity. n51 In other words, assessments may be undertaken in the absence of any "factual predicat[e]." n52 Until 2008, some form of factual predication was required to initiate any level of investigation. n53 The introduction of nonpredicated investigations is thus a significant expansion of the FBI's power. Despite the absence of the need to establish a factual basis for an assessment, agents conducting assessments under the new Guidelines have available to them a wide array of highly intrusive investigative tools. During an assessment, the FBI may: (1) recruit and task informants to attend surreptitiously First Amendmentprotected gatherings--such as religious services or political demonstrations--to collect information about what takes place there and who attends; n54 (2) engage people in conversation while misrepresenting the agent's status as a federal official (so-called "pretext interviews")--such as posing as an investigative target's new neighbor or business associate in order to gather information about her from friends, neighbors, and colleagues; n55 (3) station agents outside a target's home or office--or even have [*20] them followed--so that their movements are tracked day and night; n56 and (4) search commercial online services and resources, records maintained by "other federal, state, local, or tribal, or foreign governmental entities or agencies," n57 and all FBI and Justice Department records. n58 This includes the FBI's National Security Branch's data set "[c]omposed of government information, commercial databases and records acquired in criminal and terrorism probes" n59 that includes international travel records of citizens and aliens; financial forms; hotel and rental car records; and credit card transaction records. n60 The government can not only search these databases for particular information, but also use them to perform analysis based on a "pattern of behavior and search for that pattern in data sets." n61 Ever-more sophisticated data-mining tools render a detailed dossier on any American--even one entirely above suspicion--just one mouse click away. Thus, the Guidelines now permit, with no factual predicate, tactics that before 9/11 had been reserved for investigative stages whose initiation required at least some relevant evidence. n62 [*21] Even investigative tactics statutorily limited to instances in which there is a factual basis for suspicion may be permitted based on very tenuous links to suspected wrongdoing. Agents can issue National Security Letters (NSLs)--a form of administrative subpoena--to access without a court order certain information about individuals that is "relevant" to a terrorism investigation. n63 The relevance standard means that the individual about whom the FBI seeks information--internet or telephone subscriber information (possibly including cell-phone-generated location data providing a minute-by-minute account of an individual's movements n64), internet search records, financial records--need not herself be a target of an investigation. And after acquiring a court order under § 215 of the PATRIOT Act n65, the FBI may demand an even broader swath of information--"any tangible thing" that is "relevant to" "a full investigation," n66 a definition the government has interpreted to include the authority to collect all noncontent data regarding phone calls into, out of, and within the United States. n67 SQ => Mapping / Surveillance of Muslims Exemptions in new guidelines allow racial profiling and mapping of Muslim communities to continue --- swallows any benefits DDF, 14 (12/16/2014, news release from the Defending Dissent Foundation, US Official News, “Washington: Feds Limit Racial Profiling—With Big Loopholes,” Lexis, JMP) Defending Dissent Foundation has issued the following news release: The Justice Department issued new profiling guidelines Dec. 8 that extend limitations on it to include national origin, religion, and sexual orientation—but still allow racial and ethnic profiling at border crossings, immigration checkpoints, and in some other circumstances. The guidelines are the result of more than five years of review, Attorney General Eric Holder said in a statement, adding that “racial profiling by law enforcement is not only wrong, it is misguided and ineffective.” Though the guidelines apply only to federal law enforcement and not to state and local police, he also alluded to “recent incidents we’ve seen at the local level” and said they raise “concerns about trust in the criminal justice process.” In theory, the policy is intended to limit law enforcement’s use of racial characteristics to those specifically related to a crime, and that are timely and geographically relevant. “Law enforcement officers may never rely on generalized stereotypes, but may rely only on specific characteristic-based information,” the guidelines state. “Even if there were overall statistical evidence of differential rates of commission of certain offenses among individuals possessing particular characteristics, the affirmative use of such generalized notions by law enforcement officers in routine, spontaneous law enforcement activities is tantamount to stereotyping.” The basic principle is that, for example, police hearing a report that a grocery store in the Brownsville section of Brooklyn was robbed by a black man in his early twenties wearing a baseball cap and a hoodie would be allowed to stop and question men in the vicinity who fit that description. They would not be allowed to stop all young black men wearing baseball caps or hoodies in the neighborhood at any time, on the general grounds that the predominantly black neighborhood is a high-crime area. The devil, however, is in the loopholes and where the line is drawn. A footnote states that “this Guidance does not apply to interdiction activities in the vicinity of the border, or to protective, inspection, or screening activities.” Federal agents, who have authority to enforce immigration laws within 100 miles of the border or coastline, routinely stop people at checkpoints on roads in South Texas, on buses approaching New Orleans, and on Amtrak trains in upstate New York—and obviously, looking Mexican or Muslim is going to raise suspicion. “It’s so loosely drafted that its exceptions risk swallowing any rule and permit some of the worst law enforcement policies and practices that have victimized and alienated American Muslim and other minority communities,” Laura Murphy, director of the ACLU’s Washington Legislative Office, said in a statement. “This guidance is not an adequate response to the crisis of racial profiling in America.” The Council on American-Islamic Relations also expressed concerns, particularly about the exemptions for border crossings and those allowing the FBI “to ‘map’ minority communities to place informants.” The guidelines specify that FBI field offices may research “population demographics, including concentrations of ethnic groups” in order to “gain a better understanding of potential liaison contacts and outreach opportunities” as long as it “is undertaken pursuant to an authorized intelligence or investigative purpose.” “Under these guidelines the DOJ will still authorize the FBI’s racial mapping program to continue registering minority neighborhoods from across the nation for possible surveillance and insertion of informants – spanning African-Americans in Atlanta, Ga., to Asian-Americans in the San Francisco Bay area, to Arab and Muslim Americans in Dearborn, Mich.,” the Muslim civil-rights group said in a statement issued Dec. 8. “These guidelines will do nothing to stem the complainants CAIR receives from American Muslims that CBP profiles them based on their religion at the northern border and when returning home from travel abroad by asking about First Amendment protected activities. Questions have included: What religion do you belong to? How religious are you? Why do you wear a beard? How many times a day do you pray? What do you pray for? Which mosque do you go to? Do you pray the Morning Prayer in the mosque? Who else prays in your mosque? Who is your religious leader?” FBI maps communities to acquire data to recruit informants and start investigations Apuzzo, 14 (4/9/2014, Matt, “Profiling Rules Said to Give F.B.I. Tactical Leeway,” http://www.nytimes.com/2014/04/10/us/profiling-rules-said-to-give-fbi-tactical-leeway.html?_r=0, JMP) WASHINGTON — Attorney General Eric H. Holder Jr.’s long-awaited revisions to the Justice Department’s racial profiling rules would allow the F.B.I. to continue many, if not all, of the tactics opposed by civil rights groups, such as mapping ethnic populations and using that data to recruit informants and open investigations. The new rules, which are in draft form, expand the definition of prohibited profiling to include not just race, but religion, national origin, gender and sexual orientation. And they increase the standards that agents must meet before considering those factors. But they do not change the way the F.B.I. uses nationality to map neighborhoods, recruit informants, or look for foreign spies, according to several current and former United States officials either involved in the policy revisions or briefed on them. While the draft rules allow F.B.I. mapping to continue, they would eliminate the broad national security exemption that former Attorney General John Ashcroft put in place. For Mr. Holder, who has made civil rights a central issue of his five years in office, the draft rules represent a compromise between his desire to protect the rights of minorities and the concern of career national security officials that they would be hindered in their efforts to combat terrorism. The Justice Department has been reworking the policy for nearly five years, and civil rights groups hope it will curtail some of the authority granted to the F.B.I. in the aftermath of the 9/11 terrorist attacks. Muslims, in particular, say federal agents have unfairly singled them out for investigation. The officials who described the draft rules did so on the condition of anonymity because they were not authorized to discuss them. Mr. Holder, who officials say has been the driving force behind the rule change, gave a personal account of racial profiling on Wednesday before the National Action Network, the civil rights group founded by the Rev. Al Sharpton. “Decades ago, the reality of racial profiling drove my father to sit down and talk with me about how, as a young black man, I should interact with the police if I was ever stopped or confronted in a way I felt was unwarranted,” he said. Throughout the review process, however, the attorney general and his civil rights lawyers ran up against a reality: Making the F.B.I. entirely blind to nationality would fundamentally change the government’s approach to national security. The Bush administration banned racial profiling in 2003, but that did not apply to national security investigations. Since then, the F.B.I. adopted internal rules that prohibited agents from making race or religion and nationality the “sole factor” for its investigative decisions. Civil rights groups see that as a loophole that allows the government to collect information about Muslims without evidence of wrongdoing. Intelligence officials see it as an essential tool. They say, for example, that an F.B.I. agent investigating the Shabab, a Somali militant group, must be able to find out whether a state has a large Somali population and, if so, where it is. As written, the new rules are unlikely to satisfy civil rights groups and some of the administration’s liberal allies in Congress. Senator Richard J. Durbin, Democrat of Illinois, has said the existing rules “are a license to profile.” The Justice Department rules would also apply to the Drug Enforcement Administration, and the Bureau of Alcohol, Tobacco, Firearms and Explosives, but it is the F.B.I. that takes the lead on most national security investigations. Farhana Khera, the president of Muslim Advocates, said expanding the rules to cover nationality and religion would be a significant step forward. But she opposed any rule that allowed the F.B.I. to continue what it calls “domain mapping” — using census data, public records and law enforcement data to build maps of ethnic communities. Agents use this data to help assess threats and locate informants. “It would certainly mean we have work to do,” said Ms. Khera, who was one of several rights advocates who met with Mr. Holder about the profiling rules last week. “We want an effective ban on all forms of profiling.” Before federal agents could consider religion or other factors in their investigations under the new rules, they would need to justify it based on the urgency and totality of the threat and “the nature of the harm to be averted,” according to an official who has seen the draft. That would not prevent agents from considering religion or nationality, but officials said the goal was to establish clear rules that made doing so rare. Department officials were prepared to announce the new rules soon and had told Congress to expect them imminently. But recently, the White House intervened and told Mr. Holder to coordinate a larger review of racial profiling that includes the Department of Homeland Security, officials said. That is significant because the Bush-era racial profiling rules also contained an exception for border investigations, which are overseen by the department. Hispanic advocacy groups are as opposed to that caveat as Muslims are to the exception for national security investigations. Mr. Holder cannot tell Homeland Security what rules to follow. But he has told colleagues that he believes border agents can conduct their investigations without profiling and by following the same rules as the Justice Department, one law enforcement official said. It is not clear how long this broader review will take, but for now it has delayed release of the Justice Department rules. Relations between the F.B.I. and Muslims have at times been strained since the weeks after 9/11, when agents arrested dozens of Muslim men who had no ties to terrorism. Since then, the F.B.I. has adopted new policies and invested heavily to explain them to Muslim populations. Senior agents speak at mosques and meet regularly with imams and leaders of Muslim nonprofit groups, but suspicions remain. Internal F.B.I. documents revealed that agents used their relationship-building visits at mosques as a way to gather intelligence. Leaked training materials, which the F.B.I. quickly disavowed, described the Prophet Muhammad as a cult leader and warned that mainstream Muslims shared the same “strategic themes” as terrorists. The draft rules would establish a program to track profiling complaints. The current process is less organized, making it difficult to track patterns in complaints or how they are resolved. The guidelines didn’t go nearly far enough to rebuild relations with minority and religious communities Oleaga, 14 (12/9/2014, Michael, “DOJ Racial Profiling Guidance 2014 Update: Revised Guidelines Have Immigrant, Minority, Religious Groups 'Dismayed' With Profiling Exemptions,” http://www.latinpost.com/articles/27397/20141209/doj-racial-profiling-guidance-2014-update-revisedguidelines-immigrant-minority.htm, JMP) The U.S. Department of Justice released new guidelines on profiling individuals, but immigrant, minority and religious rights groups remained concerned about exemptions for certain federal agencies. Attorney General Eric Holder announced the revised "Guidance For Federal Law Enforcement Agencies Regarding The Use Of Race, Ethnicity, Gender, National Origin, Religion, Sexual Orientation, Or Gender Identity" aimed for law enforcement, national security and intelligence activities to adhere. Holder's new guidelines prohibit law enforcement from conducting "routine or spontaneous" decisions based on ethnicity, gender, gender identity, national origin, race, religion or sexual orientation "to any degree" unless the "listed characteristics apply to a suspect description." Civil rights groups have commended on the DOJ's new policies, but noted concerns regarding exemptions for individuals screened at the border and airports. Holder's memorandum stated, "This Guidance does not apply to Federal non-law enforcement personnel, including U.S. military, intelligence, or diplomatic personnel, and their activities. In addition, this Guidance does not apply to interdiction activities in the vicinity of the border, or to protective, inspection, or screening activities." Specifically, the U.S. Customs and Border Protection (CBP) and Transportation Security Administration (TSA) could continue to profile individuals based on ethnicity, gender, gender identity, national origin, race, religion or sexual orientation. "The release of this new and more expansive guidance is welcome and comes at an important time for our nation. But unfortunately, it still falls short," National Immigration Forum Director Ali Noorani said. "We are very disappointed that this new guidance fails to prohibit CBP from racially profiling at ports of entry and immigration checkpoints, and during stops. Racial profiling makes us less secure because it perpetuates the already fractured relationship CBP has with millions of border residents." According to Noorani, the Department of Homeland Security (DHS) and CBP's efforts toward transparency and accountability encountered a setback with the exemptions for border patrol enforcement. "In cities like El Paso, whose population is 85 percent Hispanic, allowing Border Patrol agents to take into account race and ethnicity amounts to a license to operate with impunity," Noorani said The Council on American-Islamic Relations (CAIR) also expressed concern about the new DOJ guidelines, stating, "CAIR is dismayed that at a time when our nation is struggling to come to terms with a series of highprofile police killings of unarmed African-Americans, the DOJ would release revised profiling guidelines that include loopholes for targeting U.S. Muslims and Hispanics. "Under these guidelines, the DOJ will still authorize the FBI's racial mapping program to continue registering minority neighborhoods from across the nation for possible surveillance and insertion of informants -spanning African-Americans in Atlanta, Ga., to Asian-Americans in the San Francisco Bay area, to Arab and Muslim Americans in Dearborn, Mich." CAIR commended the "sign of progress" with the Justice Department to include categories such as national origin and religion as characteristics for law enforcement to avoid specific profiling. CAIR, however, expected more progress from the department and White House as individuals are still subjected to profiling at the airport, border, communities and houses of worship. The South Asian Americans Leading Together (SAALT) was "deeply dismayed" with the DOJ's new guidance. "Justice and civil rights protections cannot be dispensed on a sliding scale. Immigrants and communities of color risk continuing to be treated as secondclass citizens by the very law enforcement officials tasked to protect them," SAALT Executive Director Suman Raghunathan said, adding that Monday's announcement attempts to ease law enforcements' profiling but the result is "deeply disappointing" for many communities nationwide. "The Department of Justice is sending a clear and disturbing message that profiling continues to be acceptable by some law enforcement agents and against many communities. The collective impact of this guidance on immigrants, border communities and other communities of color makes us all less safe and does little to respond to the implications of discriminatory profiling, which has been proven time and again to be ineffective, inefficient, and unjust," Raghunathan said. Latin Post contacted the CBP for a statement, but they did not respond. The exemptions mean 197 million people are subject to continued surveillance Saab, 14 --- Senior Government Relations Analyst at Deloitte (12/8/2014, Maria, “One Step Forward, Two Steps Back: DOJ Profiling Guidance Revisions Fail to Ban Profiling,” http://www.aaiusa.org/blog/entry/one-step-forward-two-steps-back-doj-profiling-guideline-revisions-fail-toa/, JMP) Today, Attorney General Eric Holder and the White House unveiled much anticipated revisions to 2003 Department of Justice Guidance on the Use of Race by Federal Law Enforcement Agencies (“Guidance”). The DOJ has finally expanded the definition of profiling to prohibit to the use of gender, national origin, sexual orientation and gender identity in addition to race and ethnicity. While this is a small sign of progress, the Guidance fails to address homeland security and border integrity loopholes as well FBI mapping practices that have created space for routine and egregious constitutional and civil liberties violations. Holder’s new guidelines arrive during a time where law enforcement activities are under intense scrutiny. Conversations regarding immigration reform, border security, and recent events in Ferguson, MO., New York City, and Cleveland not only emphasize the need to address such activities, but also highlight how little these new guidelines will address the real issues at stake. For one thing, the changes will only apply to federal law enforcement agencies, and will not extend to local and state law enforcement officers, which have been the source of a number of related controversies. The Obama Administration hopes that the new guidelines will serve as a possible roadmap for local police to reform their own practices regarding profiling, but this does not ultimately guarantee change on behalf of local police forces that work closely with particularly vulnerable communities. The new guidance will limit instances in which law enforcement agencies may profile for the sake of national security and goes as far as eliminating a 2003 exemption that permitted officers to use race when seeking out individuals in such cases. But profiling will by and large continue to be permitted in cases where national security and border protection are concerned. For example, federal agents are not obligated to abide by the Guidance’s prohibitions within 100-miles of national borders, which includes nearly one-third of the country and places 197.4 million people under potentially arbitrary investigation. TSA officers will also be allowed to stop passengers at airports based on prohibited qualities. The national security exception will also allow for the FBI to continue “mapping” specific communities on the basis of race, religion, and ethnicity, which has been of particular concern to Arab American and American Muslim communities nationwide. Because the guidance is confined to federal law enforcement practices, this does nothing to address the types of discriminatory targeting and surveillance programs that local agencies, such as the New York Police Department, conduct in contravention to numerous constitutionally protected freedoms. For nearly five years, Arab American Institute (AAI) has worked with a broad coalition of organizations to call on the DOJ to address these loopholes that directly impact our community and other minorities, including Latinos and African Americans. In late May, this coalition briefed Congressional staff on revising DOJ guidance to eliminate the deplorable violations of various civil liberties caused by the national security and border integrity loopholes. This included limiting discretion for profiling by border protection and TSA officers and local law enforcement agencies conducting surveillance programs on the basis of race, religion, or national origin within the parameters of the old DOJ guidance. In a phone call with various civil rights groups and organizations Monday afternoon, the Attorney General stated that while the new guidance is by no means comprehensive, it is a strong first step in improving law enforcement practices that have negatively impacted millions of Americans. The expansion on prohibited criteria for profiling is in fact strong progress in the right direction, but it’s simply not enough. As Laura Murphy of ACLU’s Washington Office stated, “this is not an adequate response to the crisis of racial profiling in America.” The exemptions, in her view, “are so loosely drafted that its exceptions risk swallowing any rule and permit some of the worst law enforcement policies and practices that have victimized and alienated American Muslim and other minority communities.” The new DOJ guidance is an effort to build strong policies against arbitrary and illegitimate racial profiling. Upon closer examination, however, the new expanded criteria and limitations do little to address critical areas where most of these profiling incidents are occurring—at the local levels and at the border. Without holding several federal agencies accountable to the new criteria and applying the same to state and local law enforcement, the practical impact of this guidance does much less than we need it to. New DOJ guidelines still allows the FBI to map Muslim communities and surveil mosques without reasonable suspicion Phelps, 14 (12/9/2014, Timothy M., Los Angeles Times, “The new face of profiling; Justice Department tightens rules, though some say not enough,” Lexis, JMP) The new guidance specifically allows the FBI and other federal law enforcement to continue to "map" communities, focusing their investigations on neighborhoods or communities based, for example, on religion or national origin. Also, some critics of the new rules are concerned that Holder was noncommittal Monday when asked whether the FBI field manual would be updated to reflect the new guidance, raising questions about whether federal agents will change their behavior. Can an undercover FBI agent enter a Brooklyn, N.Y., mosque and conduct surveillance without any probable cause to believe a crime is being committed or that terrorists are operating within the mosque. Yes, according to civil rights groups. "The Justice Department says the guidelines eliminate the national security loophole," said Farhana Khera, president of Muslim Advocates, one of the civil rights groups most involved in advocating for the changes. "While it eliminates it in name, our concern is that not much changes in practice." Recent guidelines still permits federal agents to target Muslim communities Flatow & Lee, 14 --- *J.D. from the University of Virginia School of Law and Senior Editor for ThinkProgress, AND **Immigration Reporter for ThinkProgress (12/8/2014, Nicole Flatow & Esther YuHsi Lee, “New Racial Profiling Guidance Retains Broad Exemptions For Immigration, National Security,” http://thinkprogress.org/justice/2014/12/08/3600618/dept-justice-racial-profiling-guidelines-exemptborder-agents/, JMP) Facing a national conversation on police brutality, the Department of Justice released long-awaited revised guidelines on racial profiling Monday. While recent debate has focused on police treatment of African Americans, the expanded DOJ guidelines primarily add several new categories to a racial profiling policy that previous banned profiling only based on race and ethnicity. The new categories include gender, national origin, religion, sexual orientation, and gender identity. Monday’s guidelines also narrow an expansive exception for “national security” activities. But some civil rights organizations are critical that the guidelines would still permit a broad swath of law enforcement activity aimed particularly at Muslims, as well as exempt some Department of Homeland Security agencies, such as the Transportation Security Administration and the Customs and Border Protection from continuing to stop people at the airport and at the southwest border. Issued by outgoing Attorney General Eric Holder, the guidelines replacing existing DOJ rules from 2003, and prohibit federal law enforcement officers (or state officials working in tandem with federal officials) from using such characteristics to make “routine or spontaneous” law enforcement decisions, such as traffic stops. “Profiling by law enforcement is not only wrong, it is profoundly misguided and ineffective, because it wastes precious resources and undermines the public trust,” Holder said in a statement. “Particularly in light of certain recent incidents we’ve seen at the local level — and the widespread concerns about trust in the criminal justice process which so many have raised throughout the nation — it’s imperative that we take every possible action to institute strong and sound policing practices.” But in an extended footnote, the memo notes that “this Guidance does not apply to interdiction activities in the vicinity of the border, or to protective, inspection, or screening activities.” The memo also makes clear that the guidelines apply in the national security context, but with a broad exception for “trustworthy information” related to national security, immigration, or intelligence. Among the sorts of activities that are provided of examples of still-valid activities is the mapping of ethnic groups if “undertaken pursuant to an authorized intelligence or investigative purpose.” In New York, the NYPD “demographics unit” (which would not be covered by this guidance unless working with federal officials) came under fire for mapping out the city’s Muslims, and the unit was later disbanded after the FBI said it sowed distrust among Muslims. For some civil rights organizations that have been at this since President Obama’s 2008 election, the revisions seem shortsighted and modest. ACLU Washington Legislative Office Director Laura W. Murphy said in a press statement, “It’s baffling that even as the government recognizes that bias-based policing is patently unacceptable, it gives a green light for the FBI, TSA, and CBP to profile racial, religious and other minorities at or in the vicinity of the border and in certain national security contexts, and does not apply the Guidance to most state and local law enforcement.” USA Today reported that profiling “will still be permitted during screening of commercial airline passengers, border inspections and during protective functions initiated by the U.S. Secret Service, all overseen by the Department of Homeland Security.” The new rules would otherwise affect “all Immigration and Customs Enforcement civil immigration enforcement, U.S. Coast Guard law enforcement activities, Border Patrol activities not near the border, DHS officers protecting government buildings and federal air marshals,” the Washington Post reported. It would also exempt officials from screening airline passengers and those guarding the country’s southwestern border. As Vox explained, “Under the old profiling policy, ‘the border’ was defined as anywhere within 100 miles of a land or sea border — but it’s not clear whether the ‘vicinity of the border’ applies to that whole area, or to a more limited part of it.” Border agents have come under intense scrutiny for testing the limits of its use of force tactics, including using the border search exemption of the Fourth Amendment to justify searches that have nothing to do with the border. A 2008 guidance document has allowed agents to search individuals at the border who carry in electronic devices such as laptops and cell phones without “reasonable suspicion of a crime or without getting a judge’s approval.” On more than one occasion, federal investigators used their border search authority as a means to investigate U.S. citizens to get around violating the Fourth Amendment. The guidelines would likely have little effect in Arizona, where the anti-immigration state law colloquially known as the “show me your papers” law is still enforced. Immigration advocates have long charged that Arizona police officers disproportionately and indiscriminately pull over members of the Latino community. In October, a cop threatened to “kill” or “shoot” a Latino man pulled over for a traffic violation. FBI uses “community mapping” to identify and ethnic communities Berman, 14 --- Visiting Assistant Professor of Law, Brooklyn Law School (Winter 2014, Emily, Washington & Lee Law Review, “Regulating Domestic Intelligence Collection,” 71 Wash & Lee L. Rev. 3, Lexis, JMP) Investigative activity based in part on racial or ethnic characteristics is not limited to scrutiny of individuals. FBI policy also embraces "community mapping"--the practice of collecting and storing information about particular ethnic communities. n78 [*25] The rules "permit the FBI to identify locations of concentrated ethnic communities" as well as to collect "the locations of ethnic-oriented businesses and other facilities" (including religious facilities such as mosques) because "members of certain terrorist organizations live and operate primarily within a certain concentrated community of the same ethnicity." n79 The DIOG justifies such activity by asserting that concentrations of certain ethnic communities provide an opportunity for "identified terrorist subjects from certain countries [to] relocate to blend in and avoid detection." n80 Under these authorities, the FBI has collected information about religious, ethnic, and national-origin characteristics of American communities, identifying "Arab-American and Muslim communities in Michigan as a potential terrorist recruitment ground" as well as noting "an increase in the African-American population of Georgia when analyzing [*26] 'Black Separatist' groups," pointing to Chinese and Russian communities in San Francisco "as a place to look for organized crime syndicates," and "highlighted Latino communities as potentially harboring the Central American gang MS-13." n81 Surveillance Undermines Anti-Terror Measures Prioritizing intelligence gathering trades-off with crime solving, invites more racial profiling, and undermines anti-terror cooperation Berman, 11 --- Counsel in the Liberty and National Security Project at the Brennan Center for Justice (Emily, “DOMESTIC INTELLIGENCE: NEW POWERS, NEW RISKS,” http://brennan.3cdn.net/b80aa0bab0b425857d_jdm6b8776.pdf, JMP) American law enforcement agencies have three primary roles: 1) solving crimes committed in the past, 2) preventing crimes that are imminent, and 3) collecting intelligence to stop future crimes. The further law enforcement moves toward the intelligence-collection end of the spectrum, the more expansive, and the less dependent on concrete indicia of crime or threat the investigation is likely to be. Overreach on the part of law enforcement is therefore of particular concern when it involves intelligence-gathering. Historically, the FBI has vacillated between a crime-solving and intelligence-gathering focus. Originally created to investigate specific federal crimes, the Bureau expanded into the notorious Hoover-era domestic intelligence agency, famous for excess and overreach. Revelations of Hoover-era abuses prompted the Bureau to refocus for a time on crime-solving, and a season of robust oversight and operational limitations on intelligence gathering followed. These limits were set forth in an internal set of rules, known since their creation, as the “Attorney General’s Guidelines.” The first set of Guidelines, issued in 1976, was designed to authorize FBI domestic intelligence investigations and also to answer concerns about excessive intrusiveness on the part of the agency and its agents. The Guidelines sought to tether the FBI’s intelligence-gathering activities to crime detection and prevention. They demanded a higher level of evidence of possible criminal activity (past or future) in order to justify the use of more intrusive investigative techniques. Initially, the Guidelines cabined the FBI’s activities successfully. But the restrictions began to erode over time, and the agency again expanded its intelligence-collection activities. The expansion was slow for many years but accelerated rapidly in the wake of the 9/11 attacks. And the Guidelines that Attorney General Ashcroft issued in 2002 dramatically loosened previous restrictions. After the Ashcroft revisions went into effect, several independent and congressional commissions concluded that insufficient coordination between foreign intelligence-collection efforts and domestic law-enforcement efforts contributed to the government’s failure to detect—and prevent—the 9/11 plot. Attorney General Michael Mukasey responded by issuing further-revised Guidelines in December 2008. Like the changes implemented by Attorney General Ashcroft in the wake of 9/11, the Mukasey Guidelines stress the FBI’s mission of preventing terrorist attacks. At the same time, they further liberalize the limits and oversight regime designed to check abuses of investigative power by extending time limits and eliminating supervisory approval requirements. The current Guidelines’ focus on terror prevention—rather than terror response—is commendable. Investigating imminent criminal activity or threats to the homeland is of obvious value. However, intelligence investigations pose unique risks. History teaches that as the government’s discretionary intelligence-collection powers grow, so, too, do instances of profiling based on race, religion, national origin, or unpopular viewpoint. These risks are perhaps more salient today than ever before. Gone are the file cabinets J. Edgar Hoover stuffed with information on political enemies. They have been replaced by massive (and growing) electronic databases of information about Americans who may pose no security threat. It is therefore critical that the FBI implements its domestic investigative activities in ways that avoid unnecessarily compromising the civil liberties of law-abiding Americans or the effectiveness of the FBI’s terrorism prevention efforts. The current Guidelines fail to prescribe rules designed to prevent the excesses—and their consequences—that can flow from the expansive authority they confer. The predictable result will be to chill the free exercise of religion, association, and expression of the population as a whole and to alienate the very communities whose cooperation is most vital to successful national security efforts.19 Political and religious based surveillance that is not tied to criminality fails --doesn’t yield useful intel and trades off with other counter-terror efforts Fisher, 4 --- Associate Professor of Law and Director, Center for Social Justice, Seton Hall Law School (Winter 2004, Linda E., Arizona Law Review, “Guilt by Expressive Association: Political Profiling, Surveillance and the Privacy of Groups,” 46 Ariz. L. Rev. 621, Lexis, JMP) B. The Need for and Benefits of Political Surveillance While the costs of unjustified surveillance can be severe, in other instances surveillance is necessary to avert violence and apprehend terrorists. Although some commentators claim that proper analysis of existing intelligence data could have prevented the September 11 attacks, n208 others believe that the intelligence agencies' failure to obtain detailed information on the operation of [*658] domestic terrorist cells was a major cause. n209 In any event, good intelligence data is undeniably necessary to prevent future attacks. As a society, we remain haunted by the specter of September 11, and policymakers are understandably reluctant to forgo any possibility of gaining useful intelligence. Since Al Qaeda, like other criminal organizations, operates clandestinely, counterterrorism agencies are themselves required to gather intelligence secretly using informers and infiltrators. Those investigations, however, need to focus on areas and subjects most likely to yield information about terrorists. n210 Because resources are limited, and investigators cannot follow up on all leads, only the most likely targets should be subjected to surveillance and infiltration. That a group is engaged in religious and political activity does not immunize it from law enforcement scrutiny, but its involvement in out-of-the-mainstream First Amendment activity also does not make it likely to be involved in crime. Expression of unpopular - and sometimes even repugnant - views is distinct from evidence of crime. n211 An easy-to-identify proxy or profile for terrorism would be immensely useful if a sufficiently accurate one could be found. But general expression of political or religious beliefs has not proved to be a meaningful indicator in individual cases. Internationally, and in the U.S., radical Islamists have committed numerous crimes of violence, but the assumption that abstract advocacy of religious or political violence by Muslims in the U.S. in itself indicates an intent to engage in domestic terrorism is erroneous. n212 For example, proclaiming that citizens of countries that occupy Muslim lands all deserve to die does not demonstrate criminal intent. It stands to reason that such mutable characteristics, [*659] which can be changed at will, would generally be poor indicators of terrorism, which relies on deception. In fact, the available evidence indicates that terrorists tend to avoid expressing political beliefs publicly, in an effort not to attract attention. n213 Nonetheless, certain terrorists may express beliefs endorsing violence, at least privately. Even so, abstract political or religious advocacy of violence - which is not a crime - cannot in itself justify an investigation. More evidence is needed, such as advocacy of violence against a specific target or advocating imminent violence. n214 Any other standard would facilitate investigations that could only rarely, at best, be useful, at the price of seriously compromising the right of association. And requiring evidence of concrete endorsement of violence will not inhibit investigations unduly. Nor does it appear that religion or ethnicity can accurately serve as a proxy for involvement in terrorism. n215 One need only cite the detention of over 700 Muslim men in New York and New Jersey - virtually all unconnected to terrorism - after September 11. n216 Other interrogations and arrests of Muslims across the country corroborate the point. n217 Because profiling based on these characteristics causes great harm and has not been demonstrated to provide effective indicators of criminality, another standard must be employed, as set forth in the next Section. [*660] Nonetheless, some contend that any correlation, even the slightest one, between the profiled characteristic and crime can justify use of a profiling practice when the potential danger is severe. Terrorism certainly would fall within that category. Might not the extreme danger posed by terrorism, combined with the possibility that Muslims with radical beliefs are more likely to be terrorists than the remainder of the population, justify political profiling in certain circumstances? My response, is that this justification for surveillance is generally insufficient, though a terrorist emergency involving a serious threat of imminent violence could justify a preliminary inquiry on less than an individualized reasonable suspicion of crime. n218 The threat presented by international terrorism is not more dangerous than other threats faced by the U. S. in the twentieth century. On the contrary, it is substantially less dangerous than the Cold War's nuclear standoff, which threatened the immediate destruction of not only the United States but also the entire world. It is not sufficiently qualitatively distinct from past threats to justify abrogation of basic civil liberties. Past civil liberties violations such as the Palmer Raids, the excesses of the McCarthy era, the injustice of the internment of Japanese-Americans during World War II, or the abuses of surveillance in the 1960's did little to increase national security The nature of the current domestic threat does not justify complete deference to the executive branch with respect to the associational rights of those within the U.S. Although courts often defer to the political branches in cases where national security is at stake, that deference is not absolute and is "subject to important constitutional limits." n219 In particular, courts hesitate to defer where constitutional rights are heavily implicated, n220 as they undeniably are in the case of [*661] political or religious surveillance. Although courts lack expertise in adjudicating questions concerning the national defense, reasonable restrictions on domestic political surveillance will not hamper the necessary defense of our national security. Political surveillance diverts law enforcement and undermines cooperation necessary for good intel gathering --- focus on criminality solves Fisher, 4 --- Associate Professor of Law and Director, Center for Social Justice, Seton Hall Law School (Winter 2004, Linda E., Arizona Law Review, “Guilt by Expressive Association: Political Profiling, Surveillance and the Privacy of Groups,” 46 Ariz. L. Rev. 621, Lexis, JMP) The political profiling I discuss here is in some respects analogous to racial and ethnic profiling: both are based on a surrogate characteristic that is thought to correlate with criminality. n181 A primary justification, then, is the focusing of scarce law enforcement resources where they can be more efficiently deployed. n182 The model breaks down, though, insofar as the profiled trait does not correlate cleanly or well with criminality. With political profiling, as indicated supra, the correlation between general expression of radical political beliefs, that is, abstract advocacy, and criminal actions is insufficient. n183 With respect to racial profiling, empirical studies have indicated, for instance, no correlation between [*652] African-American drivers and disproportionate involvement in either drug crime or traffic offenses as compared to other drivers. n184 In the absence of validation, keeping in mind the history of race discrimination, and the significant harms of profiling, the practice is not justified. n185 In addition, there are inefficiencies in the sweeping, overbroad types of political surveillance typically conducted. Resources are diverted from legitimate law enforcement when investigations focus on politics, rather than criminality. Political or religious investigations are not sufficiently focused to produce good intelligence information - only a focus on criminality can target likely suspects. n186 Monitoring and surveillance also create resentment that impedes the cooperation necessary for good intelligence-gathering and criminal investigation. n187 Law enforcement and intelligence agencies need the cooperation of Muslim communities to develop the intelligence that can help discover real terrorists, who are unlikely to tip off authorities by making rash political statements. n188 Surveillance Undermines Trust in Law Enforcement Recent events have undermined trust in law enforcement --- closing loopholes is necessary to send a positive signal Perez, 15 --- CNN Justice Reporter (2/2/2015, Evan, “Expanded federal ban on profiling doesn't apply at borders, airport screening,” http://www.cnn.com/2014/12/08/us/new-profiling-laws/, JMP) (CNN)New federal law enforcement guidelines set to be issued Monday will expand protection from profiling, but won't apply to screenings at borders and airports, or in intelligence operations. The new guidelines replace ones in place since 2003, which prohibit profiling based on race and ethnicity, but also include broad exemptions for national security investigations. The Justice Department will issue the new guidelines that will prohibit profiling based on religion, national origin, gender, sexual orientation and gender identity, a Justice official said. The expanded ban on profiling comes amid widespread street protests around the nation in the wake of controversial killings of black men by white police officers. The shooting of 18-year-old Michael Brown by a white officer in Ferguson, Missouri, set off wider discussions about police tactics and complaints by black men that they bear the brunt of suspicion and profiling by police. Attorney General Eric Holder in 2009 ordered a review of the profiling ban and pushed for an expansion. He ran into opposition along the way, including from the FBI, whose agents feared it would make their work more difficult, and more recently from the Homeland Security Department, which sought more flexibility for its agencies before agreeing to join the new policy. The new profiling guidelines apply to state and local law enforcement agencies when they are part of federal law enforcement operations. Holder plans to brief state and local law enforcement officials on a conference call Monday and plans to urge them to adopt the federal policy in a speech in Memphis on Tuesday, according to a Justice official. "Profiling by law enforcement is not only wrong, it is profoundly misguided and ineffective -- because it wastes precious resources and undermines the public trust. Particularly in light of certain recent incidents we've seen at the local level -- and the widespread concerns about trust in the criminal justice process which so many have raised throughout the nation -- it's imperative that we take every possible action to institute strong and sound policing practices.," Holder said in a statement provided by the Justice Department in anticipation of Monday's announcement. DHS agencies, including federal air marshals, Homeland Security investigations, and the Coast Guard will be covered by the new policy. But screenings at ports of entry, including airports, are exempted from the profiling policy. The same applies to intelligence operations, which include federal agents' work to recruit informants. Despite the new broader ban on profiling, some critics aren't satisfied that it goes far enough. Rajdeep Singh, director of law and policy at the Sikh Coalition, said in a statement that "the message this continues to send is that certain communities are still suspect, and we worry this will lead to more hate crime and discrimination." Laura W. Murphy, legislative office director for the ACLU in Washington, said in a statement that the new guidance is "not an adequate response to the crisis of racial profiling in America," arguing that the new guidelines are "so loosely drafted" and contain flexibility that can affect American Muslims. The group Muslim Advocates also argued the new rules don't go far enough in protecting American Muslims from profiling by the FBI, Customs and Border Protection, and other law enforcement agencies. "We urge the administration to finish the job by addressing these outstanding, gaping problems with the Guidance," the group said in a statement. The FBI’s community mapping serves as a pretext for heightened law enforcement in targeted communities that undermines vital trust building Human Rights Watch, 14 (12/8/2014, “US: Updated Racial Profiling Rules Fall Short; Congress Should Ban Use of Tactic for Communities, at Border,” http://www.hrw.org/news/2014/12/08/usupdated-racial-profiling-rules-fall-short, JMP) (Washington, DC) – The US Department of Justice long-awaited reforms to its rules on racial profiling still permit discriminatory practices against minority groups and migrants, Human Rights Watch said today. The revisions to the Justice Department’s 2003 Guidance Regarding the Use of Race by Federal Law Enforcement Agencies (the “Guidance”), released on December 8, 2014, include modest improvements, such as adding religion as a prohibited basis for profiling. However, the Guidance allows community profiling and profiling in US border areas. The Guidance only applies to federal agencies, not state law enforcement officers unless they are collaborating in an investigation. “Attorney General Eric Holder is trying to have it both ways, criticizing profiling while embracing it at the same time,” said Antonio Ginatta, US advocacy director at Human Rights Watch. “Bottom line: there’s no right way to profile.” The 2003 Guidance prohibited the use of race or ethnicity during traditional law enforcement activities by federal agencies, but allowed for profiling under several exemptions and omissions. Those included profiling to protect national security and maintain border integrity. The Guidance also did not specifically prohibit profiling on the basis of religion. The announced reforms explicitly prohibit profiling on the basis of religion during traditional law enforcement, as well as on national origin, gender, sexual orientation, and gender identity. The updated Guidance eliminates a national security exemption, but still allows community profiling programs. And the 2014 Guidance specifically does not apply to “interdiction activities in the vicinity of the border, or to protective, inspection, or screening activities” at the border. Human Rights Watch has been monitoring reports of alleged profiling at US borders – which under a 1950s regulatory interpretation means anywhere within a 100 air miles of the actual border. A recent Human Rights Watch letter to Holder documented the case of a US citizen of Mexican origin living 22 miles from the US border with Canada who was interrogated by US Border Patrol agents while serving as a translator for a Mexican woman at the request of local police. A number of lawsuits have alleged that Customs and Border Protection agents have been racially profiling residents of border regions. Though the Guidance purports to eliminate the national security exemption, it effectively creates a new one by allowing the Federal Bureau of Investigation (FBI) to continue community mapping programs, through which the FBI collects information on where ethnic and religious communities are located. The danger of community mapping is that it serves as a pretext for heightened law enforcement in those communities, causing mistrust of law enforcement in precisely the communities where law enforcement officials need to build trust, Human Rights Watch said in a separate letter to Holder. The Justice Department first began reviewing the Guidance in 2009. Holder announced his resignation as attorney general in September but agreed to stay on until his successor is confirmed. “Half-hearted reforms are a sorry legacy,” Ginatta said. “Congress should step in and put an end to profiling once and for all.” Federal surveillance guidelines greenlight the discriminatory targeting of Arabs and Muslims --- undermines faith between law enforcement and minority communities Rhodan, 14 (12/8/2014, Maya, “New Federal Racial Profiling Guidelines Worry Civil Rights Groups,” http://time.com/3623851/justice-department-racial-profiling-muslims-sikhs-aclu/, JMP) Civil liberties organizations say some groups would still be subject to profiling While the Department of Justice is set to unveil some major changes to federal racial profiling guidelines on Monday, some civil rights groups worry they don’t go far enough. The Justice Department is expanding on guidelines released in 2003 that prohibited profiling based on race and ethnicity. Now, anti-profiling protections in federal law enforcement operations include national origin, religion, sexual orientation, gender and gender identity. The guidelines also apply to both federal law enforcement agents and state and local agents on federal task forces. But some carve-outs—such as screenings and inspections by the Transportation Security Administration and U.S. Customs and Border Protection—have raised eyebrows among groups including the American Civil Liberties Union, Muslim Advocates and the Sikh Coalition. “It’s baffling that even as the government recognizes that bias-based policing is patently unacceptable, it gives a green light for the FBI, TSA, and CBP to profile racial, religious and other minorities at or in the vicinity of the border and in certain national security contexts, and does not apply the Guidance to most state and local law enforcement,” said Laura Murphy, the director of ACLU’s Washington legislative office. Muslim Advocates, a faith-based legal and educational advocacy organization, echoed those sentiments. “While these changes are welcome,” a statement reads, “it is difficult to see how the guidance will improve the lives of law-abiding American Muslims who are singled out and targeted based on their faith, not evidence of wrongdoing, by the FBI, Customs and Border Protection, and other law enforcement agencies.” The Department of Justice guidelines do not apply to activities conducted by military, intelligence or diplomatic personnel. Border screening activities are also not covered, which has been of particular concern to civil rights groups. After 9/11, sweeping counterterrorism efforts were imposed that led Arab and Muslim Americans—and some perceived to be Muslim or Arabic such as South Asians and Sikhs—to feel singled out and profiled by the federal government. A 2009 ACLU and Rights Working Group report found that Arabs, Muslims and South Asians “have been disproportionately victimized through various government initiatives” including FBI surveillance, questioning, airline profiling and no-fly lists. But the fact that the Department of Homeland Security isn’t covered by the Department of Justice’s guidelines doesn’t mean the agency has free rein to profile. “It’s important to remember that DOJ is one agency and DHS is another,” says Margo Schlanger, a University of Michigan law professor and former DHS officer for civil rights and civil liberties. In fact, the Department of Homeland Security issued its own guidelines on profiling in 2013. Under that policy, DHS personnel are only permitted to use race or ethnicity as a factor “when a compelling governmental interest is present, and only in a way narrowly tailored to meet that compelling interest.” Still, the DOJ’s new anti-profiling requirements apply to some DHS activities including civil immigration enforcement, Coast Guard, air marshal, and border patrol activities away from the border. Border and transportation security screenings and inspections, however, remain among the few activities that are excluded. The Department says they will be reviewing the activities not covered by the guidance “to ensure we are including every appropriate safe guard and civil rights protection in the execution of those important security activities,” according to a fact sheet. “The DHS policy is a little different, but it’s not unregulated,” Schlanger says. “The challenge for both DHS and DOJ going forward is going to be implementation.” Implementation will be key, too, for both agencies in the ongoing effort to restore faith between law enforcement and minority communities. The nation is at a critical moment in terms of race relations, particularly as it relates to interactions with law enforcement. As protests to grand jury decisions not to indict two white police officers involved in the deaths of unarmed black men in New York and Ferguson, Mo., continue, the Obama Administration has made a point to draw attention to the issue of community policing. Attorney General Holder, who hopes the new guidelines represent one of his signature accomplishments. “Our police officers cannot be seen as an occupying force disconnected from the communities they serve. Bonds that have been broken must be restored. Bonds that never existed must now be created,” Holder said during a recent trip to Atlanta. FBI counterterror strategies are sparking outrage in Muslim communities Ackerman, American national security reporter and blogger, national security editor for the Guardian, and Yuhas, 15 (3/25/2015, Spencer & Alan, The Guardian, “FBI told its cyber surveillance programs have actually not gone far enough; In-house 9/11 Review Commission calls for further expansion of informant and cyber surveillance networks but largely ignores domestic intelligence gathering,” Lexis, JMP) Bulk searches and 'mainstream' Muslims: what's not in the report The commission, composed of establishment figures like Reagan attorney general Ed Meese and former Indiana centrist Democratic representative Tim Roemer, had significantly less to say about the major policy controversies emerging from the FBI's domestic intelligence expansion. Last year, the federal government's civil liberties watchdog confirmed that FBI agents can search international communications from Americans collected in bulk from the National Security Agency without even a log of their access. Numerous studies, including a 2010 Justice Department report, have confirmed that the FBI abused its powers to issue nonjudicial subpoenas known as "exigent letters" or "national security letters" to improperly access Americans' phone data. Perhaps most controversially, the FBI stands accused of tracking American Muslims' constitutionally protected activities and using them as leverage to create informants, which has led to the cultivation of terrorist plots smacking of entrapment. Bureau counterterrorism agents, as late as 2011, were instructed that Islam itself and "mainstream" Muslims, rather than specific terrorist plots, were appropriate bureau targets. Tactics like those have sparked overwhelming anger in US Muslim communities that the FBI insists it treats as a partner. Muslim Cooperation Checks Extremism Only cooperation with moderate Muslims can check Islamic extremism --government surveillance can’t keep pace Morici, 15 --- economist, a professor of international business at the University of Maryland (2/22/2015, Peter, “Obama and moderate Muslims both fail to fight Islamic extremism,” http://www.washingtontimes.com/news/2015/feb/22/peter-morici-obama-and-moderate-muslims-bothfail-/?page=all, JMP) Fighting racism, prejudice and the violence those can beget is everyone’s job. Muslims would do well to respond to President Obama’s invitation to combat extremist ideas in their communities, but too often Washington’s broader policies toward minorities encourage just the opposite Ideologies of love and hate have a lot in common. Those appeal to youth seeking meaning and the marginalized in simple terms and easily metastasize to uncontrollable dimensions. The message Saint Peter and other apostles spread through the Roman Empire was easily reduced to a narrative no longer than this column. Once they visited a community, new evangelists emerged to preach in other places. Roman soldiers could ferret out the believers in one town, only to have dozens crop up in others. Medieval fables about the deeds of Jews, enjoying even greater brevity but equal poignancy, spread quickly and remain dangerous today. Islamic extremists benefit from similar simplicity by proselytizing that modern life conflicts with Islamic teaching, the West and colonialism are responsible for the despair afflicting so many Muslim communities, and violence is necessary to defend the faith and redress injustices. That message is easily carried from one neighborhood to another, propagated over the internet, and benefits from considerable financial support from ISIS. In the United States and Europe, top-down government education programs and surveillance will never be any more adequate than the Roman legions. Without the specific participation and vocal support of moderate Muslim leaders, extremism can infect entire communities. For example, in Vilvoorde Belgium, a town of only 4200, 28 young people have left for Syria and Iraq and another 40 may leave Parents, teachers and religious leaders are best able to first spot the beginnings of hateful influences among young people and engage them. They can do what Christian leaders have been doing for years—explain to young people that hateful ideas about others are ill-founded and can do as much harm to them as to their targets. Cooperation of Muslims helps alert U.S. that American-Muslims are joining radical forces Simon & Hooper, 9 --- *host of NPR, AND **communications director for The Council on AmericanIslamic Relations (12/12/2009, “FBI-Muslim Cooperation Resulted In Arrests,” http://www.npr.org/templates/story/story.php?storyId=121374117, JMP) The arrests in Pakistan this week of five young American Muslim men suspected of trying to join radical forces may not have been possible without the cooperation of Muslims in the United States. The Council on American-Islamic Relations contacted the FBI after relatives of the suspects sought the council's help when the men disappeared. Host Scott Simon talks to Ibrahim Hooper, communications director for the Council, about the group's cooperation with law enforcement. SCOTT SIMON, host: The Council on American-Islamic Relations, or CAIR, was the group that tipped off the FBI that the five young men from Northern Virginia had left the country. It's important to note that there's been a contentious relationship between CAIR and the FBI in recent years. Plan => Rebuilds Relations with Muslim Communities The plan rebuilds relations with Muslim communities which is necessary to prevent homegrown al Qaeda-inspired terrorism Schanzer, 12 --- Associate Professor of the Practice, Sanford School of Public Policy at Duke University and Director of the Triangle Center on Terrorism and Homeland Security (3/20/2012, David, “Time to Reset Police-Muslim Relations,” http://www.huffingtonpost.com/david-schanzer/fbi-muslimtreatment_b_1368273.html, JMP) The cornerstone of the Obama administration's strategy for addressing homegrown terrorism is the development of trusted relationships between law enforcement and communities targeted by al Qaeda and other radical groups. Since the policy was rolled out last summer, a series of episodes has undercut this effort. Media reports uncovered FBI training materials identifying Islam as an inherently violent religion, New York Police Department commissioner Ray Kelly appeared in an inflammatory film decried by Muslim leaders and allegations have arisen that a NYPD counterterrorism unit has been spying and keeping files on individual Muslims without any evidence of criminal wrongdoing. We need to hit the reset button quickly and establish a partnership between law enforcement and Muslim Americans that can provide a foundation for an effective national counterterrorism policy. There are three key sources of tension that all need to be addressed: government-funded training that casts Islam as encouraging violence, surveillance of individuals and communities without a criminal predicate and the use of informants to goad individuals into criminal activities. The FBI has acted aggressively to deal with the training controversy by setting up a task force to review 150,000 pages of training materials and remove inaccurate, offensive content. Similar action needs to be undertaken by other counterterrorism agencies. State and local authorities that receive federal funds should also be required to use only the screened, approved training materials. While these actions are warranted, any effort to strip counterterrorism training of any reference to Islam would be misguided and counterproductive. Anyone involved in counterterrorism needs to understand the powerful ideology motivating violent extremism and how it draws on Islamic sources to attract (mostly) young Muslim men to its cause. Good training can and should explain the distinction between radicalism and Islam. On the question of surveillance, police will collect far more useful information if they apply community policing tactics to counterterrorism instead of secretly snooping around mosques and halal restaurants. Community policing has resulted in dramatic reductions in crime over the past 20 years by getting police into the communities and interacting with shopkeepers, community leaders, religious authorities, teachers and children. Building trust with the community will eventually lead to a channel for the exchange of helpful information. Communities that believe they are under the constant threat of surveillance, however, will simply shut down to outsiders. Surveillance of open source materials on the internet is a thornier problem. Police surveillance of a group's online activities, based exclusively on an ethnic or religious affiliation, is wrong and will damage the trust we need to successfully prevent homegrown violent extremism. However, if we want to preempt acts of terrorism before they occur, we cannot unduly tie the hands of our counterterrorism officials. Indeed, most would be outraged if a successful terrorist attack occurred and it were later revealed that the bomber had revealed his violent ideology in an internet chat room, but the police were barred from monitoring such sites. I suggest that law enforcement be permitted to conduct surveillance of open source communications if officials can articulate a reasonable suspicion that members of the group have or may be planning to engage in criminal activity. This is the same standard that applies when a police officer stops a person on the street for questioning and a pat down. Such a standard must apply to open source surveillance of all groups -- not just Muslim Americans. Give and take on both sides is required to relieve tension over the use of confidential informants in many recent terrorism cases. It is unfortunate that following the arrests of many terrorism suspects, the initial response of some Muslims has been to question the use of informants rather than criticize the conduct of the perpetrators. For example, after a suspect was arrested for plotting to detonate a suicide bomb inside the U.S. Capitol, a lawyer commented that: "It's controlled from the beginning to the end by the FBI... Had the FBI not been involved, through their manipulation or informants, would the same thing have happened?" Instead of challenging the use of informants, Muslim American critics of law enforcement might instead ask themselves what the impact would have been on the Muslim American community if this individual had not been investigated by the FBI and went on to commit the first suicide bombing inside the United States. Defusing tensions over this issue will require the FBI to provide Muslim American leaders insight into their investigative policies and procedures and assurances that these tactics are being used appropriately and on a non-discriminatory basis. Trust can be established in the other direction if community leaders refrained from reflexively denouncing terrorism arrests based on the activities of confidential informants before the totality of the evidence surrounding a case has been presented and the full context of the perpetrator's actions can be understood. Homegrown, al Qaeda-inspired terrorism is not widespread, but it is still a serious threat. The best way to combat it is to build trust between law enforcement and Muslim Americans. To do this, we have to confront the tensions in this relationship head on. AT: CVE Strategy Fails The plan resolves the factors preventing an effective CVE program Afeef, 15 --- attorney specializing in criminal justice policy, a former executive director of the Council of Islamic Organizations of Greater Chicago, and a Truman National Security Project Political Partner (3/12/2015, Junaid, “Why Independent Investigations Promote Trust Between Communities and Law Enforcement,” http://www.patheos.com/blogs/altmuslim/2015/03/why-independent-investigationspromote-trust-between-communities-and-law-enforcement/, JMP) The national “Countering Violent Extremism” program is predicated on a collaboration between law enforcement and the community. Until those cases of questionable conduct by the FBI with regard to its use of confidential informants and unlawful surveillance are properly addressed, the community will remain hesitant, and the CVE effort will falter. And as mentioned above, the British government needs to conduct an independent investigation into MI5’s conduct with the British Muslim community. Plan solves important shortcomings of CVE --- including low Muslim trust and overt focus on surveillance ACLU, 15 (2/6/2015, US Official News, “Washington: The Lone-Wolf Terror Trap: Why the Cure Will Be Worse Than the Disease,” Lexis, JMP) Counterproductive Responses At the moment, the response to the lone-wolf hullabaloo, like so much else in recent years, is inching us further down the path toward an American police state. One government response, now being reemphasized, comes (of course!) with its own acronym: countering violent extremism, or CVE. The program, announced in 2011, aims to partner with communities – almost exclusively Muslim ones in practice -– in the name of terrorism prevention. One of the ways communities are to do this is by creating safe spaces where individuals can discuss politics and religion without fear of lurking government agents. Yet members of these same communities will then be encouraged to report back to authorities about what was said and by whom in an effort to identify those at-risk of becoming violent extremists, whether alone or in concert with others. American Muslim communities have already experienced government stings and infiltration by informants, and tasking community members to report back to authorities doesn't seem much different than directly putting agents in their midst. If CVE's goal is to build the capacity within communities to prevent violence and terrorism, lone or otherwise, then agencies like Health and Human Services and the Department of Education should be leading the way. They could provide social and mental health services and educational resources – to all communities instead of singling particular ones out based on religion, race, or ethnicity. Instead, not surprisingly, the White House has put the Department of Homeland Security, the Department of Justice, and the FBI in charge of executing its CVE programs, while emphasizing the coordinating role of local U.S. Attorneys' Offices. American Muslim communities are rightly leery of this arrangement, particularly in light of the way these outfits have recently focused on religious beliefs as a basis for suspicion and, at least in the FBI's case, have manufactured terror plots by preying on the sick and the vulnerable. Other proposed solutions to the "lone-wolf" problem are even more indiscriminate. In a recent book, former RAND Corporation analyst Jeffrey Simon offers an inventory of possible technological strategies for identifying the wolf in sheep's clothing before he attacks. These are typical of our moment and include the widespread use of Internet-enabled smart surveillance cameras, as well as the active, suspicionless monitoring of Internet and social media usage. Another increasingly popular approach he suggests is the expansion of biometric collection, meaning the government would assemble biological traits unique to each individual, such as facial dimensions and DNA, without any evidence of wrongdoing. It should be noted that such an approach – and it's typical of the direction the national security state and law enforcement have taken in these years – would represent a fundamental assault on a free society. Such "countermeasures" should send a shiver down your spine. Simon seems to recognize this, writing, "Privacy issues will have to be addressed, including the willingness of the public to have their facial expressions, eye movements, heart rates, breathing patterns, and other characteristics captured by sophisticated sensors wherever they go in order for a decision to be made by others concerning what they might be intending to do." The dangers to Americans in allowing government agencies to collect such intimate information in order to discover whether any of them are possible lone wolves should be obvious in terms of the destruction of privacy, among other things. The result would be both an Orwellian world and a hopeless one in safety terms. It's already clear that none of these expensive and advanced technological "solutions" will work. Totally innocent conduct ("false positives") will overwhelm the truly menacing. Some of these approaches, like surveillance cameras, may help finger a perpetrator after the crime, while others, such as trying to identify who will engage in terrorism by his body language, will only further contribute to the security theater the government has staged since 9/11. Nevertheless, the ineffectiveness of an intrusive security state won't stop its adherents from pushing for more power and methods of control that are ever more intrusive. "We have to put... aside... all the bleeding-heart, politically correct people who say we can't be emphasizing one community over the other," VICE quoted Congressman Peter King as saying in a radio appearance. The threat, he added, is "coming from the Muslim community and it shows that the [New York Police Department] and [former police commissioner] Ray Kelly were right for so many years when they were really saturating areas where they thought the threat was coming from." The once-secret NYPD suspicionless surveillance program King is referring to – it stretched from Connecticut to Pennsylvania – never produced a single terrorism lead, much less a conviction. It was "successful" at only one thing: making American Muslim communities in the greater metropolitan area feel as if they were under siege and destroying trusting relations between them and the police. As King demonstrates, the people who pledge to protect our lives and our liberties are often the same ones who cry wolf. With shepherds like these guarding the flock, wolves may be beside the point. AT: No Domestic Terrorism / American-Muslim Coop Now *** ***note when prepping file --- this evidence could be moved to the 1ac to replace the specific CVE ev or preempt negative uniqueness evidence. Domestic terrorism is low now because of cooperation from Muslim-Americans, but aggressive law enforcement will sour it Risen, 14 --- technology and business reporter for U.S. News & World Report (7/9/2014, Tom, “Racial Profiling Reported in NSA, FBI Surveillance; Prominent Muslim-Americans were targeted by government surveillance, reports say,” http://www.usnews.com/news/articles/2014/07/09/racial-profiling-reported-innsa-fbi-surveillance, JMP) The National Security Agency and the FBI have reportedly been overzealous trying to prevent terrorist attacks to the point that anti-Islamic racism in those agencies led to the surveillance of prominent Muslim-Americans, revealing a culture of racial profiling and broad latitude for spying on U.S. citizens. An NSA document leaked by former agency contractor Edward Snowden to reporter Glenn Greenwald shows 202 Americans targeted among the approximately 7,485 email addresses monitored between 2002 and 2008, Greenwald’s news service The Intercept reports. To monitor Americans, government agencies must first make the case to the Foreign Intelligence Surveillance Court that there is probable cause that the targets are terrorist agents, foreign spies or “are or may be” abetting sabotage, espionage or terrorism. Despite this filter The Intercept identified five Muslim-Americans with high public profile including civil rights leaders, academics, lawyers and a political candidate. Racial profiling of Muslims by security officers has been a controversy since the terrorist attacks of 2001 spiked fears about al-Qaida trainees preparing more attacks. The New York Police Department has disbanded its unit that mapped New York’s Muslim communities that designated surveillance of mosques as “terrorism enterprise investigations” after pressure from the Justice Department about aggressive monitoring by police. A 2005 FBI memo about surveillance procedures featured in The Intercept story uses a fake name “Mohammed Raghead” for the agency staff exercise. This latest report about email surveillance of successful Muslim-Americans is akin to “McCarthyism” that fed paranoia about communist spies during the Cold War, says Reza Aslan, a professor at the University of California, Riverside. “The notion that these five upstanding American citizens, all of them prominent public individuals, represent a threat to the U.S. for no other reason than their religion is an embarrassment to the FBI and an affront to the constitution,” Aslan says. There is a risk of radicalization among citizens Americans, evidenced by some who have gone to fight jihads in Syria and Somalia, but mass shootings carried out by U.S. citizens of various racial backgrounds occurs much more often, says Vanda Felbab-Brown, a senior fellow on foreign policy at the Brookings Institution. Since 1982, there have been at least 70 mass shootings across the U.S. “We have seen very little domestic terrorism in the U.S.,” Felbab-Brown says. This lack of terrorism is due in part to the willingness of the Islamic community to cooperate with law enforcement to identify possible radical threats, out of gratitude that the U.S. is a stable, secure country compared with the Middle East, she says. “That could go sour if law enforcement becomes too aggressive, too extreme,” she says. The FBI’s ability to spy on U.S. citizens – even government employees and those without criminal records – will expand this summer when its new facial recognition database becomes fully operational. The new database called Next Generation Identification system, or NGI, will include photos of anybody who sends images as part of an application for a job that requires fingerprinting or a background check. The Muslim-Americans monitored by the government included Nihad Awad, the executive director and founder of the Council on American-Islamic Relations, a Muslim advocacy and civil rights organizations. The group has been represented by the Electronic Frontier Foundation represents the CAIR Foundation in a case challenging the NSA’s mass collection of Americans’ call records. “These disclosures yet again demonstrate the need for ongoing public attention to the government’s activities to ensure that its surveillance stays within the bounds of law and the Constitution,” said a blog post from EFF Staff Attorney Mark Rumold. “And they once again demonstrate the need for immediate and comprehensive surveillance law reform." AT: Muslim-Americans Cooperating Now SQ levels of cooperation aren’t enough --- building cooperation is key to access more vital intelligence Crowley, 15 (2/18/2015, Michael, “Barack Obama’s 'extremism' language irks both sides; His carefully selected words on ISIL have frustrated both the left and the right,” http://www.politico.com/story/2015/02/barack-obamas-extremism-language-irks-both-sides-115304.html, JMP) ***Note --- Hina Shamsi is director of the American Civil Liberties Union’s national security project Critics of community outreach programs say little data exists to demonstrate their effectiveness in spotting terrorists. One academic guest at Wednesday’s summit admitted as much, Shamsi said. Nor, they argue, is there reason to believe Muslim-American communities are shy about reporting would-be radicals: A 2011 study by a University of North Carolina at Chapel Hill sociologist found that “the largest single source of initial information [about terror plots] … involved tips from the Muslim-American community.” That’s not enough, White House homeland security advisor Lisa Monaco recently argued. In a speech on the anniversary of the 2013 Boston Marathon bombing last April, Monaco said that in more than 80 percent of cases involving homegrown terrorists, community members “had observed warning signs a person was becoming radicalized to violence.” “But more than half of those community members downplayed or dismissed their observations without intervening,” Monaco added. “So it’s not that the clues weren’t there. It’s that they weren’t understood well enough to be seen as the indicators of a serious problem.” In his remarks on Wednesday, Obama called Muslim Americans “the people who are most targeted and potentially the most affected” by terrorist recruiters and stressed the need for “more dialogue and more trust and more cooperation.” But he also said it would be a mistake to “securitize” the government’s relationship with Muslim Americans, “dealing with them solely through the prism of law enforcement.” “Because when we do,” Obama added, “that only reinforces suspicions, makes it harder for us to build the trust that we need to work together.” AT: USA Freedom Act Solves USA Freedom Act leaves most surveillance powers untouched Press TV, 15 (6/5/2015, “USA Freedom Act will continue warrantless wiretapping by NSA: Journalist,” Lexis, JMP) US President Barack Obama signed the USA Freedom Act into law on Tuesday, hours after the Senate gave its final approval for the legislation. The bill passed the US House of Representatives on May 13, 2015. The new law will replace the Patriot Act, the sweeping surveillance legislation passed in the days immediately after the attacks of Sept. 11, 2001. The law eliminates the NSA's bulk phone-records collection program and replaces it with a program that keeps the records with phone companies but allows the government to search them with a court warrant. The legislation will phase out the once secret NSA phone spying program over a six months period. The program was made public two years ago by former agency contractor Edward Snowden. However, the legislation would continue other post-9/11 surveillance provisions, including the FBI's authority to gather business records in terrorism and espionage investigations and to more easily eavesdrop on suspects who regularly discard mobile phones to avoid surveillance. The American Civil Liberties Union and other privacy advocates have warned that the bill does little to ensure privacy. "No one should mistake this bill for comprehensive reform. The bill leaves many of the government's most intrusive and overbroad surveillance powers untouched, and it makes only very modest adjustments to disclosure and transparency requirements," said Jameel Jaffer, the ACLU's deputy legal director. USA Freedom Act still permits a majority of surveillance Ackerman, 15 --- American national security reporter and blogger, national security editor for the Guardian (6/1/2015, Spencer, The Guardian, “Fears NSA will seek to undermine surveillance reform; Privacy advocates are wary of covert legal acrobatics from the NSA similar to those deployed post-9/11 to circumvent congressional authority,” Lexis, JMP) The USA Freedom Act, a compromise bill, would not have an impact on the vast majority of NSA surveillance. It would not stop any overseas-focused surveillance program, no matter how broad in scope, nor would it end the NSA's dragnets of Americans' international communications authorized by a different law. Other bulk domestic surveillance programs, like the one the Drug Enforcement Agency operated, would not be impacted. The rise of what activists have come to call "bulky" surveillance, like the "large collections" of Americans' electronic communications records the FBI gets to collect under the Patriot Act, continue unabated - or, at least, will, once the USA Freedom Act passes and restores the Patriot Act powers that lapsed at midnight on Sunday. USA Freedom Act won’t constrain the NSA Press TV, 15 (6/5/2015, “USA Freedom Act will continue warrantless wiretapping by NSA: Journalist,” Lexis, JMP) A new US law passed by Congress on Tuesday to reform widespread spying programs by the National Security Agency (NSA) will do very little to change the overall surveillance situation in the United States, an American investigative journalist says. "The USA Freedom Act will continue this policy of warrantless wiretapping by the NSA," said Wayne Madsen, who is also an author specializing in international affairs. "The people who say that the USA Freedom Act will constrain the NSA within legal bounds… they're living in a dream world, they know that they want to maintain NSA surveillance authorities," Madsen said during a phone interview with Press TV on Friday. "The only way to deal with NSA is not to mend it, is to end it, get rid of it, get rid of the NSA and get rid of the CIA; we have too many intelligence agencies that tear up the US Constitution on a daily basis," he added. AT: Second Circuit Court Solves Bulk Data Collection Second circuit ruling doesn’t establish a prohibitive precedent against bulk data collection Ackerman, 15 --- American national security reporter and blogger, national security editor for the Guardian (6/1/2015, Spencer, The Guardian, “Fears NSA will seek to undermine surveillance reform; Privacy advocates are wary of covert legal acrobatics from the NSA similar to those deployed post-9/11 to circumvent congressional authority,” Lexis, JMP) Julian Sanchez, a surveillance expert at the Cato Institute, was more cautious. "The second circuit ruling establishes that a 'relevance' standard is not completely unlimited - it doesn't cover getting hundreds of millions of people's records, without any concrete connection to a specific inquiry - but doesn't provide much guidance beyond that as to where the line is," Sanchez said "I wouldn't be surprised if the government argued, in secret, that nearly anything short of that scale is still allowed, nor if the same Fisa court that authorized the bulk telephone program, in defiance of any common sense reading of the statutory language, went along with it." AT: FBI / Guidelines Prevents Religious / Racial Surveillance Guidelines only prevent surveillance based solely on race or religion --- doesn’t stop FBI from still considering it Berman, 14 --- Visiting Assistant Professor of Law, Brooklyn Law School (Winter 2014, Emily, Washington & Lee Law Review, “Regulating Domestic Intelligence Collection,” 71 Wash & Lee L. Rev. 3, Lexis, JMP) The Guidelines are not blind to the concerns these tactics raise. In fact, they bar the FBI from initiating investigations into U.S. persons "solely for the purpose of monitoring activities protected by the First Amendment." n82 Nor may the Bureau "predicat[e] an investigation simply based on somebody's race." n83 But the Guidelines as well as the DIOG prevent such activity only when it is motivated solely by the desire to monitor First Amendment-protected activities, or by race, religion, or national origin. n84 Investigative activity prompted in part by these factors is not barred. n85 Individuals thus can be singled out for scrutiny due, at least in part, to their political or religious expressions, [*27] activities, or associations. This profiling on the basis of "national origin plus" could expose a large population of innocent persons to FBI scrutiny. Indeed, as law enforcement officials told the Associated Press, "[a]mong the factors that could make someone the subject of an investigation is travel to regions of the world known for terrorist activity . . . along with the person's race or ethnicity." n86 Thus, every individual of Pakistani origin who travels to Pakistan to visit family is conceivably at risk of being subjected to FBI investigation merely on that basis. FBI explicitly encourages its agents to override civil liberties to achieve security priorities Berman, 14 --- Visiting Assistant Professor of Law, Brooklyn Law School (Winter 2014, Emily, Washington & Lee Law Review, “Regulating Domestic Intelligence Collection,” 71 Wash & Lee L. Rev. 3, Lexis, JMP) 3. Intelligence Collection and Structural Constraints The governance concerns posed by the FBI's intelligence-focused mission and the lack of traditional oversight are compounded by the FBI's tendency to emphasize that mission over other concerns. The Attorney General and the FBI are responsible for incorporating two sometimes conflicting responsibilities into intelligence-collection policies--terrorism prevention and civil liberties protection. n139 Given the incentives to err on the side of security, the Guidelines risk short-changing civil liberties concerns when the two missions conflict. The FBI declares on its website that "[a]s an intelligence-driven and a threat-focused national security organization with both intelligence and law enforcement responsibilities," its mission is to "to protect and defend the United States against terrorist and foreign intelligence threats, to uphold and enforce the criminal laws of the United States, and to provide leadership and criminal justice services to federal, state, municipal, and international agencies and partners." n140 Similarly, the Bureau identifies as its top priority protecting the United States from terrorist attack, followed by combatting foreign intelligence operations, cyberattacks, high-technology crimes, and public corruption. n141 [*39] In other words, despite its location in the Department of Justice and its law-enforcement responsibilities, the FBI is now primarily a national security and intelligence-focused agency. n142 In all of the FBI's statements listing its goals and priorities, protecting civil liberties falls far below protecting against terrorist attacks and other security threats. n143 Like the FBI's other statements of its priorities, the post9/11 Guidelines themselves present "[p]rotection of the United States and Its people" as the goal that the FBI's investigative authorities are designed to further. n144 And while the Guidelines have always explicitly required investigators to use the least intrusive method possible to achieve their investigative goals, n145 as of 2002 the Guidelines include a caveat: agents should not "hesitate to use any lawful techniques consistent with these Guidelines, even if intrusive," n146 where the degree of intrusiveness is warranted in light of the seriousness of a threat, or in light of the importance of foreign intelligence sought in the United States' interests. n147 This [*40] point is to be observed in particular, agents are instructed, in investigations relating to terrorism. n148 The DIOG presents even larger concerns on this front. Those rules are devised and implemented within the FBI itself. n149 Thus, any nonsecurity perspective that Justice Department officials may bring is absent from the DIOG. And because the terms of the Guidelines are relatively skeletal, the FBI is left to fill in most of the details itself. The DIOG does include hortatory language regarding the need to be solicitous of civil liberties; to refrain from infringing on First Amendment rights and from profiling on the basis of race, religion, ethnicity, or national origin; and to limit appropriately the scope and intrusiveness of FBI activity. n150 It also instructs that "when First Amendment rights are at stake, the choice and use of investigative methods should be focused in a manner that minimizes potential infringement of those rights." n151 But after warning agents to take privacy, equal protection, and First Amendment rights into account, the DIOG concludes by reiterating that "FBI employees may use any lawful method allowed, even if intrusive, where the intrusiveness is warranted by the threat to the national security or to potential victims of crime." n152 AT: DOIG Limits Abuses ***note when prepping file --- consider breaking the ev into smaller parts based on particular needs of the 3 separate args Current guidelines don’t guarantee least intrusive methods or prevent investigations based on race or religion and they maintain racist community mapping policies Berman, 11 --- Counsel in the Liberty and National Security Project at the Brennan Center for Justice (Emily, “DOMESTIC INTELLIGENCE: NEW POWERS, NEW RISKS,” http://brennan.3cdn.net/b80aa0bab0b425857d_jdm6b8776.pdf, JMP) 2. The Domestic Investigative Operational Guidelines The Attorney General’s Guidelines are implemented by the “Domestic Investigative Operational Guidelines” (DIOG), promulgated by the FBI. After official requests by at least two organizations pursuant to the Freedom of Information Act,130 the Justice Department publicly released—with significant redactions—the current DIOG. The DIOG purports to impose additional rules on FBI agents in their exercise of some of the authorities criticized above. To be sure, the Guidelines themselves do occasionally reference FBI policy as an additional limitation on FBI investigative authority,131 and the DIOG includes laudable hortatory language regarding the need to be solicitous of civil liberties; to refrain from infringing on First Amendment rights and from profiling on the basis of race, religion, ethnicity, or national origin; and to limit appropriately the scope and intrusiveness of FBI activity.132 But the DIOG’s efforts to achieve these goals fall short in at least four respects. First, the DIOG makes only a half-hearted commitment to the requirement that agents use the least intrusive method that is likely to procure the needed information when conducting investigations.133 Upon close inspection, the admonition to use the least intrusive method is less forceful than it appears.134 When advising agents on how to determine which method is the “least intrusive method,” the DIOG institutes a balancing test. After determining the least intrusive method for a given situation, “reviewing and approving authorities should balance the level of intrusion against investigative requirements” to determine which technique actually to employ.135 In other words, the least intrusive method should be employed unless the agent decides—despite having determined that a less intrusive method is likely to procure the needed information—that a more intrusive method should be used because of the seriousness of the crime or threat, the significance of the information to be gained, or other such factors. This balancing test renders the term “least intrusive method” a misnomer. Moreover, the final word on the FBI’s “least intrusive method” policy echoes the words of the Guidelines themselves: agents should use “any lawful method allowed, even if intrusive” when the agent determines such methods are warranted. This caveat sends an important message—minimal intrusiveness may be preferable, but is not actually required. Ultimately, as the Guidelines state and the DIOG echoes, “the choice of methods … is a matter of judgment.”136 Establishing such a loose and discretionary standard—and then presenting it as a “least intrusive method” requirement—provides an illusion of civil liberties protections with little substance behind it. Second, the DIOG bars investigative activities “based solely on the exercise of First Amendment rights or on the race, ethnicity, national origin, or religion” of their subject.137 The DIOG does not, however, preclude investigative activity based in part—or even primarily—on such factors. Notably, the Justice Department’s policy regarding the use of race by law enforcement officials prohibits employing “race or ethnicity to any degree” in making routine law enforcement decisions.138 The DIOG thus appears to be in tension with existing DOJ policy on this point. Moreover, even the prohibition against basing investigations solely on protected characteristics is undermined by the DIOG’s instruction that such characteristics may permissibly be linked to terrorist or criminal behavior. For example, if investigative experience and reliable intelligence reveal that members of a terrorist or criminal organization are known to commonly possess or exhibit a combination of religion-based characteristics or practices (e.g., group leaders state that acts of terrorism are based in religious doctrine), it is rational and lawful to consider such a combination in gathering intelligence about the group.139 Similarly, the DIOG permits the collection of information regarding ethnic and racial behaviors “reasonably believed to be associated with a particular criminal or terrorist element of an ethnic community.”140 The DIOG thus embraces the logical fallacy that if all members of a particular terrorist group share a certain characteristic (such as the Muslim faith), then anyone who shares that characteristic is a fair target of suspicion. On its face, this could mean collection of information on Muslim men who grow their beards or observe their religion in a particular fashion. No generic admonition to respect privacy and civil liberties can combat these permissive standards. Also troubling is the DIOG’s embrace of community mapping—which involves collecting and storing information about particular communities. They “permit the FBI to identify locations of concentrated ethnic communities” as well as to collect “the locations of ethnic-oriented businesses and other facilities” (likely including religious facilities such as mosques) because “members of certain terrorist organizations live and operate primarily within a certain concentrated community of the same ethnicity.”141 This very same principle was proposed by local law enforcement authorities in Los Angeles but was ultimately scrapped when widespread and vocal protests from the Muslim and civil liberties communities equated the plan with racial profiling and noted that it was likely to alienate Muslim residents.142 The DIOG seems to place great faith in the ability of the “authorized purpose” requirement143 to keep investigative activities from wandering too far afield. But when the authorized purposes are as broad as they are—investigating violations of law or threats to national security, investigating the role of groups in violations of law or threats to national security, identifying potential targets of criminal activities or threats to national security, etc. —and when so much investigative activity may take place in the absence of any factual predicate, that requirement seems largely toothless. Third, while the DIOG contains detailed rules regarding when, how, and under what circumstances the FBI may use each particular investigative method available to it,145 the fact that these rules are set forth in the DIOG, rather than in the Attorney General’s Guidelines themselves, is problematic. The DIOG does usefully resurrect many of the procedural protections that had been stripped out of the Guidelines themselves. For example, they add supervisory approval requirements, both for particular investigative techniques and for certain types of investigations.146 They place time limits on each investigative stage (except for full investigations). They require periodic file reviews for all assessments and investigations.147 And they increase oversight for investigations into targets that raise “sensitive investigative matters,” which include investigations of politicians, political or religious organizations, or members of the news media.148 Each of these provisions is a step in the right direction. But rather than forming part of the higher-profile, infrequently modified, and fully disclosed Guidelines themselves, they have been “downgraded” to the easierto-change, less politically salient, and more secretive DIOG. If the DIOG reinstates so many of the procedural requirements that had been stripped out of the Guidelines, it begs the question why the location of these rules was moved. Moreover, while the DIOG seems to call for greater internal oversight than the Guidelines themselves require, neither set of rules provides for the external oversight—from Congress and from the public—necessary to ensure both that Americans’ civil liberties are safeguarded and that the Guidelines are effective. Perhaps most troublingly, the rules regarding the most intrusive investigative techniques permitted in the absence of factual predicates for investigation—pretext interviews and undisclosed participation in religious and political gatherings—are redacted entirely (despite being labeled unclassified) from the publicly available DIOG. So whether the DIOG aims to mitigate any of the troubling aspects of these techniques is impossible to say. And if they do impose additional restrictions, the fact that they do so secretly limits their effectiveness as a constraint—if no one outside the Justice Department knows the rules to which agents are expected to adhere, enforcement of those rules becomes a matter of FBI grace.149 DIOG rules eliminated important oversight found in previous guidelines Berman, 14 --- Visiting Assistant Professor of Law, Brooklyn Law School (Winter 2014, Emily, Washington & Lee Law Review, “Regulating Domestic Intelligence Collection,” 71 Wash & Lee L. Rev. 3, Lexis, JMP) A final notable modification to the Guidelines implemented in 2008 was the elimination of the vast majority of oversight provisions contained in prior iterations of the Guidelines--time limits on investigations, the need to obtain supervisory approval, requirements to report regularly to FBI Headquarters or the Justice Department. n87 Instead, these restrictions have been relegated to the DIOG, thereby empowering the FBI to determine the scope of its own power in this regard. n88 Indeed, the DIOG may be changed whenever the FBI--not the Attorney General--determines that it should be (as it was in 2011 n89), and FBI [*28] leadership can authorize departures from the DIOG's requirements. n90 There may have been good reason for some of these changes. Indeed, some of them were the result of recommendations made by the 9/11 Commission to improve America's counterterrorism capacity. n91 There have, after all, been significant changes since 1976--in the threats that we face, in the need for intelligence gathering, in Americans' expectations of what their government should do to protect them and their interests. The limits on FBI intelligence activities imposed in the 1970s, however, reflected concerns expressed by the legislature and the public. n92 The current Guidelines, by contrast, have fundamentally transformed the role of America's primary domestic federal law enforcement agency with almost no public debate and with no legislative action. n93 Thus, regardless of what one thinks about the propriety of the changes themselves, we might question the adequacy of the process leading to such a transformation. Solvency External Checks Solvency *** External controls on FBI prevents political and religious profiling while maintaining important law enforcement functions Fisher, 4 --- Associate Professor of Law and Director, Center for Social Justice, Seton Hall Law School (Winter 2004, Linda E., Arizona Law Review, “Guilt by Expressive Association: Political Profiling, Surveillance and the Privacy of Groups,” 46 Ariz. L. Rev. 621, Lexis, JMP) Introduction Since September 11, Americans have accepted new restrictions on their freedom in return for the promise of increased security in their daily lives. Most people have reconciled themselves to increased governmental surveillance and some limitations on their daily activities, such as security screenings and enhanced video surveillance, with the belief that these measures will reduce the likelihood of terrorist attacks. While people are rightly concerned that the United States (U.S.) might be subject to another attack by Al Qaeda, n2 there is a risk that increased security measures and surveillance will unduly focus on individuals and groups unlikely to be involved in terrorism. n3 Those likely to be targeted by law enforcement, such as Muslims attending mosques or political dissidents protesting war in Iraq, can face repercussions considerably more serious than waiting in line to pass through a metal detector. n4 The history of the FBI and other law enforcement surveillance gives scant comfort to those engaged in lawful political and religious activities who are [*623] concerned about becoming targets of surveillance. n5 From its inception until restrictions on its activities were imposed in the mid-1970s - and even sometimes thereafter - the FBI regularly conducted politically motivated surveillance, choosing targets based on their political or religious beliefs. As part of its investigations, it compiled and widely disseminated political dossiers, engaged in warrantless searches, and disrupted the lawful First Amendment activities of a wide array of groups opposed to government policy. n6 Local police "Red Squads" did the same. n7 During the war in Vietnam, the CIA, despite restriction of its mission to foreign intelligence, also conducted domestic surveillance operations. n8 Religious groups engaged in political activity were among the targets of intelligence agency investigations. n9 The most notorious example of FBI overreaching was its five-year campaign to discredit Martin Luther King, Jr. and to "neutralize" him as an effective civil rights leader. n10 These efforts included sending Dr. King's wife a tape recording obtained from microphone surveillance, accompanied by a note that many have interpreted as an attempt to induce him to commit suicide. n11 Muslims who frequent mosques and Islamic centers - particularly those that express religious or political views considered "extreme" - are now concerned about being subjected to abusive and unjustified law enforcement behaviors similar to those documented by the Senate Committee to Study Governmental Operations with respect to Intelligence Activities (hereinafter Church Committee Report) in 1976. n12 Without external constraints, law enforcement almost inevitably investigates dissidents based on their political or religious expression. Moreover, legal controls on surveillance have recently been lifted or modified, potentially facilitating renewed political surveillance. n13 [*624] Politically motivated surveillance such as that previously engaged in by the FBI raises serious First Amendment concerns, including potential violations of associational rights. When investigations focus not on legitimate law enforcement purposes but rather on subjects' First Amendment conduct, n14 fundamental yet fragile constitutional rights are abridged. n15 One could accurately dub this [*625] phenomenon "political profiling." n16 This form of profiling relies on guilt by association and is simply not an effective law enforcement technique. n17 Targets of political surveillance typically report being chilled in the exercise of their rights to engage in free speech and the free exercise of religion. And, suffering actual or potential damage to their reputations, they change their behavior accordingly. n18 Many citizens and lawful residents are reluctant to engage in First Amendment conduct if that activity will result in an FBI file branding them as extremists or terrorists. And in the most extreme cases, information gathered can be used to destroy organizations and lives. n19 The FBI recently has admitted surveilling mosques in nine U.S. cities, and to keeping certain Muslims in the U.S. under intensive surveillance. n20 Agents have [*626] insisted that certain mosques provide them with lists of worshippers. n21 In February of 2004, the Justice Department subpoenaed university records concerning peaceful on-campus meetings of local antiwar activists. n22 In 2003, the New York City Police Department questioned arrestees at antiwar demonstrations about their political affiliations and entered the information into a database. n23 Months later, the media reported that the FBI was collecting extensive information on the antiwar movement, in a search for "extremists." n24 Moreover, the FBI has continued to question political demonstrators across the country, while the Justice Department has approved an FBI tactic of encouraging local police to report suspicious behavior at political and antiwar demonstrations to counterterrorism units. n25 In 2002, Chicago Police infiltrated five protest groups, including the American Friends Service Committee. n26 Although information concerning the full extent and nature of current surveillance is not available, history demonstrates that, absent meaningful restrictions, politically motivated surveillance will increase, as the Church Committee concluded. n27 The Supreme Court's expansive construction of the First Amendment-based right of association, as originally defined in NAACP v. Alabama, n28 and delineated most recently in Boy Scouts v. Dale, n29 can protect groups engaged in First Amendment conduct from unjustified political or religious surveillance that causes them cognizable harm. Because privacy in association is fundamental to the First Amendment, because political surveillance causes significant harm to expressive association, and because a group's conception of the conduct that would interfere with its expression must be taken into account, the right of association may outweigh the State's interest in appropriate instances. [*627] While limitations on surveillance cannot unduly restrict the Government's ability to conduct necessary intelligence-gathering, requiring a reasonable suspicion of criminal activity before investigating First Amendment activity can help achieve a suitable balance between national security interests and associational rights. n30 This evidence of criminal activity supplies the compelling state interest that justifies narrowly tailored investigations. Thus, protection of national security can coexist with civil liberties, and political profiling can be eliminated when investigations are premised upon a legitimate law enforcement purpose, rather than on protected beliefs. In fact, the thesis of this Article is that the Constitution should prohibit domestic surveillance of U.S. persons' First Amendment activity n31 in the absence of a reasonable suspicion of criminal activity. n32 Politically motivated investigations are not permissible, since the mission of law enforcement is to enforce the criminal laws, not to monitor political or religious expression. The history and purposes of the constitutional right of association corroborate this conclusion. n33 A consent decree that essentially adopts the approach I endorse was recently entered in a political surveillance lawsuit against the Denver Police Department. n34 In addition, the reasonable suspicion standard should be adopted - or retained - in legislation, regulations, and guidelines that apply to the FBI and other law enforcement agencies. This standard remains for police departments accepting federal aid. n35 The FBI's guidelines on domestic terrorism investigations employed the standard, or its substantial equivalent, for twenty-six years, before severely curtailing its use. n36 The Church Committee Report recommended [*628] employing the standard in terrorism investigations as early as 1976. n37 In light of the Supreme Court's current conception of the constitutional right of association, the legal arguments favoring restraints on political surveillance are stronger than ever. Those legal restraints should now be strengthened, rather than removed. Section I of this Article gives a historical overview of past surveillance practices, including a description of the various techniques employed. Section II elaborates on the overlapping doctrines of associational privacy and expressive association, along with the underlying policies embedded in them. Section III analyzes the relationship between expressive association and political or religious surveillance. It identifies both the costs and benefits of political surveillance. It also argues - from a First Amendment perspective - that politically motivated and targeted surveillance unconstitutionally violates the right of association unless a reasonable suspicion of criminal activity exists. Moreover, even if a reasonable suspicion exists, the least restrictive method of investigation must be employed. The Article then concludes by urging restraint and recollection of past abuses of civil liberties in times of national trauma. n38 External checks are necessary to curtail FBI surveillance and ensure guidelines are perceived as properly designed and implemented. Berman, 11 --- Counsel in the Liberty and National Security Project at the Brennan Center for Justice (Emily, “DOMESTIC INTELLIGENCE: NEW POWERS, NEW RISKS,” http://brennan.3cdn.net/b80aa0bab0b425857d_jdm6b8776.pdf, JMP) Executive Summary Successful domestic counterterrorism policy is vital to keep the homeland safe. In this effort, policymakers must resist the oft-exhibited tendency to overreact to the threats we face. This overreaction, time and again,1 takes a similar form: In the face of a perceived existential threat, we expand the scope of the government’s powers while simultaneously diminishing oversight of and accountability for the use of those powers. We fail to ensure that these powers will be employed in a manner consistent with our fundamental values. Civil liberties—such as privacy and freedom of expression, association, and religion—are often curtailed. In the wake of 9/11, government action exhibited this tendency across a wide range of counterterrorism policies. To his credit, President Obama acknowledged this overreaction in several areas, implementing much-needed modifications to inherited policies, which improved procedural protections, guarded against civil liberties violations, and increased transparency. But in many respects, the Obama Administration’s counterterror efforts resemble those of the Bush Administration’s second term. This is especially true in the context of countering domestic terrorism threats. One key example: The Obama Administration’s choice to rely upon rules drafted by its predecessor to increase the FBI’s authority for domestic investigations, including probes into terrorist threats. We believe these rules, known as the Attorney General’s Guidelines for Domestic FBI Operations (“Attorney General’s Guidelines” or “Guidelines”), tip the scales too far in favor of relatively unchecked government power, allowing the FBI to sweep too much information about too many innocent people into the government’s view. In so doing, they pose significant threats to Americans’ civil liberties and risk undermining the very counterterrorism efforts they are meant to further. And while some may doubt the severity of these threats, nobody can argue that such broad powers in the hands of government officials should not be monitored regularly to ensure that they are not being abused. The Guidelines, implemented by Attorney General Michael Mukasey in December 2008, are considerably more permissive than earlier versions implemented by previous Attorneys General. This permissiveness raises two concerns. First, the Guidelines expand the FBI’s discretion to investigate individuals and groups while simultaneously limiting oversight requirements and thereby risk opening the door to invasions of privacy and the use of profiling on the basis of race, ethnicity, religion, national origin, or political ideology. In so doing they also risk chilling constitutionally protected activities. Second, the Guidelines could render the FBI’s counterterrorism efforts less effective. Some perceive investigations under these Guidelines to impact disproportionately the freedom of expression and association of law-abiding members of certain groups. This perception risks undermining any otherwise beneficial aspects of the Guidelines by alienating the very communities whose cooperation is most essential. Moreover, the sheer volume of information collected raises the concern that it will elude meaningful analysis. The Mukasey Guidelines significantly loosen the restrictions on the FBI’s investigative powers that had been in place for decades—restrictions that remained even in the Guidelines implemented by Attorney General John Ashcroft in the wake of 9/11—in the following ways: 1. They authorize “non-predicated” investigations—substantive investigative activity in circumstances in which there is no “information or . . . allegation indicating” wrongdoing or a threat to national security.2 2. They permit intrusive investigative techniques—such as using informants, conducting interviews under false pretenses, and engaging in unlimited physical surveillance—during non-predicated investigations. 3. They encourage the government to collect, retain, and disseminate vast amounts of information about lawabiding individuals. 4. They weaken procedural safeguards—eliminating or reducing many of the requirements for supervisory approval of particular investigative techniques and temporal limits on investigative activity—that have been integral to the Guidelines’ regime since it was first implemented in 1976. These changes are not merely cosmetic. They grant the FBI license to employ intrusive techniques to investigate Americans when there is no indication that any wrongdoing has taken place. This means that FBI agents can collect and retain vast amounts of information, much of it about the innocent activities of lawabiding Americans. And it can then retain that information indefinitely and share it with other government agencies. It is thus crucial to ensure that sufficient limits, as well as meaningful internal and external checks, are imposed on this power. We cannot know how much of this information-collection occurs, or how frequently it leads to the identification and neutralization of threats. But what we do know is that the Guidelines grant government officials significant discretion in making investigative decisions. In the absence of meaningful limitations on the FBI’s authority, agents or informants may attend religious services or political gatherings to ascertain what is being preached and who is attending. They may focus their attention on particular religious or ethnic communities. They may gather and store in their databases information about where individuals pray, what they read, and who they associate with. All with no reason to suspect criminal activity or a threat to national security. And then they may keep that information in their databases, regardless of whether it indicated any wrongdoing. We also know that without sufficient limits and oversight, well-meaning efforts to keep the homeland safe—efforts which rely heavily on the collection and analysis of significant amounts of information about Americans—can adversely impact civil liberties. Indeed, history teaches that insufficiently checked domestic investigative powers frequently have been abused and that the burdens of this abuse most often fall upon disfavored communities and those with unpopular political views. Investigations triggered by race, ethnicity, religious belief, or political ideology may seem calibrated to address the threat we face, but instead they routinely target innocent people and groups. Beyond the harm done to individuals, such investigations invade privacy, chill religious belief, radicalize communities and, ultimately, build resistance to cooperation with law enforcement. Given the risks posed by placing such power in officials’ hands, it is particularly important to ensure that the FBI’s domestic authorities are designed and implemented in ways to ensure both that they minimize these adverse effects and that the cost of any drawbacks that do persist is outweighed by what is gained. In other words, unless the Guidelines effectively enable law enforcement to counter the terrorist threat, the risks they pose to civil liberties are too high. It is therefore also critical to know how the Guidelines are being administered and whether they are effective. In designing Guidelines that allow the FBI to combat the threat of terrorism while protecting our values, it is important to note one additional fact: the United States is not at war with Islam. Indeed, to the contrary. Presidents Obama and George W. Bush both took great pains to disavow any implication that the U.S. struggle was against Islam as such.3 Policymakers past and present,4 scholars,5 national security experts,6 and terrorists7 themselves all recognize that any appearance that the U.S. views Islam as the enemy actually provides Al Qaeda and its allies propaganda that aids recruitment and creates additional risk for our armed forces.8 While a tiny minority of Muslims adopt a perverse version of their faith that encourages violence, the vast majority of American Muslims are law-abiding, patriotic, productive members of society. Any investigative scheme that singles out groups or individuals for government scrutiny based on the assumption that all Muslims in the U.S. are potential terrorists fosters an environment of suspicion and distrust and is likely counterproductive as well. Again, we do not know exactly how these powers are being used or whether they are being abused. Nor do we know what measures, if any, the Justice Department has taken to protect against such abuse. What we do know is this: the Guidelines, on their face, raise new and troubling concerns about possible violations of civil liberties on a wide scale. Ensuring that such abuses do not, in fact, take place requires two types of remedies. First, some of the powers extended to the FBI should be curtailed. In addition to any substantive changes, however, we must ensure that there are meaningful checks on the FBI’s remaining powers— internal checks, such as supervisory approval requirements and regular reviews, as well as external checks, from both Congress and the public. The current Guidelines can be modified relatively easily. A few changes will limit agents’ discretion and increase oversight and accountability mechanisms. This report recommends two types of changes to the existing guidelines. First, procedural mechanisms should be put in place to ensure sufficient oversight of how the Guidelines are used, and whether they are effective. Such mechanisms must exist both within the Justice Department and outside it. For example, Congress should undertake regular reviews of the Guidelines, the ways in which they are being implemented, and their level of effectiveness. Second, some of the most dramatic expansions of FBI power should be scaled back, both to ensure that intrusive investigative methods are used only when there are facts indicating a need for further investigation and to guard against improper consideration of race, religion, ethnicity, national origin, or political ideology in investigative decisions. Reasonable Suspicion Solvency The plan applies stricter First Amendment standards to protect the constitutional right to association Fisher, 4 --- Associate Professor of Law and Director, Center for Social Justice, Seton Hall Law School (Winter 2004, Linda E., Arizona Law Review, “Guilt by Expressive Association: Political Profiling, Surveillance and the Privacy of Groups,” 46 Ariz. L. Rev. 621, Lexis, JMP) III. Expressive Association and Political/Religious Surveillance This Section examines the governmental and associational interests implicated in surveillance of First Amendment activity, employing the Supreme Court's decisions on associational rights beginning with NAACP and culminating with Dale. Although surveillance issues are generally analyzed solely under the Fourth Amendment, political surveillance should be analyzed primarily under the stricter standards of the First Amendment because it is directed at political and religious speech. At the point of convergence of the First and Fourth Amendments, the reasonableness restrictions of the latter inform analysis, but the compelling state interest standard of the First Amendment should govern; otherwise, [*644] expressive activity is not adequately and consistently protected. n152 To be consistent, First Amendment standards should govern across the board, regardless of whether a search or seizure might occur. Moreover, the Fourth Amendment does not cover much of the investigative activity involved in political surveillance, either because no potential search or seizure is involved, or because individuals in a group setting do not have the requisite "reasonable expectation of privacy." n153 Even so, the First Amendment protects these individuals and groups from unjustified investigations that intrude upon their lawful expressive activity. n154 [*645] Political surveillance is defined as an array of techniques employed by government agents to investigate and record the political and religious beliefs and activities of those engaged in First Amendment expression, ranging from infiltrating and disrupting organizational leadership to observing and recording public events. n155 Note that the definition does not include terrorism investigations that are not based on First Amendment expression. In addition, I do not focus on investigations that are based on non-First Amendment conduct, but that incidentally include First Amendment expression. These situations would include, for instance, an investigation of certain members of a mosque because a known terrorist had held a meeting there. The investigation could incidentally encompass First Amendment activity. Videotaping of demonstrators who have announced a plan to engage in civil disobedience by blocking traffic could also fall into this category. n156 Cases such as this would be analyzed under the more lenient test of United States v. O'Brien, n157 which rejected a First Amendment challenge to a federal statute prohibiting the destruction of draft cards. The statute punished conduct that was not inherently expressive, and served an important state interest. n158 O'Brien's prosecution after symbolically burning his draft card was constitutional because the expressive component of his action was ancillary to, though intertwined with, the conduct itself. n159 By contrast, the investigations I discuss in this Article are initiated because of First Amendment expression. Targets are chosen - or profiled - on the basis of lawful political or religious expression, not because of conduct. First Amendments standards are more strict to curtail political surveillance Fisher, 4 --- Associate Professor of Law and Director, Center for Social Justice, Seton Hall Law School (Winter 2004, Linda E., Arizona Law Review, “Guilt by Expressive Association: Political Profiling, Surveillance and the Privacy of Groups,” 46 Ariz. L. Rev. 621, Lexis, JMP) ***footnote #30 n30. See infra text accompanying notes 221-68. Note that although this standard has been borrowed from Fourth Amendment doctrine, political surveillance should be analyzed under the stricter standards of the First Amendment, since political and religious speech - forms given the highest degree of protection - are implicated. AT: Circumvention ***note when prepping file --- many of the solvency cards, especially Berman 11, make claims that are very useful to answer circumvention style arguments. Circumvention won’t happen if surveillance is prohibited Ackerman, 15 --- American national security reporter and blogger, national security editor for the Guardian (6/1/2015, Spencer, The Guardian, “Fears NSA will seek to undermine surveillance reform; Privacy advocates are wary of covert legal acrobatics from the NSA similar to those deployed post-9/11 to circumvent congressional authority,” Lexis, JMP) Despite that recent history, veteran intelligence attorneys reacted with scorn to the idea that NSA lawyers will undermine surveillance reform. Robert Litt, the senior lawyer for director of national intelligence, James Clapper, said during a public appearance last month that creating a banned bulk surveillance program was " not going to happen ". "The whole notion that NSA is just evilly determined to read the law in a fashion contrary to its intent is bullshit, of the sort that the Guardian and the left - but I repeat myself - have fallen in love with. The interpretation of 215 that supported the bulk collection program was creative but not beyond reason, and it was upheld by many judges," said the former NSA general counsel Stewart Baker, referring to Section 215 of the Patriot Act. This is the section that permits US law enforcement and surveillance agencies to collect business records and expired at midnight, almost two years after the whistleblower Edward Snowden revealed to the Guardian that the Patriot Act was secretly being used to justify the collection of phone records from millions of Americans. With one exception, the judges that upheld the interpretation sat on the non-adversarial Fisa court, a body that approves nearly all government surveillance requests and modifies about a quarter of them substantially. The exception was reversed by the second circuit court of appeals. Baker, speaking before the Senate voted, predicted: "I don't think anyone at NSA is going to invest in looking for ways to defy congressional intent if USA Freedom is adopted." Congress can exercise oversight authority to ensure FBI compliance Berman, 11 --- Counsel in the Liberty and National Security Project at the Brennan Center for Justice (Emily, “DOMESTIC INTELLIGENCE: NEW POWERS, NEW RISKS,” http://brennan.3cdn.net/b80aa0bab0b425857d_jdm6b8776.pdf, JMP) 4. Congressional Review. • Congress also should exercise vigorously its oversight authority to police the FBI’s use of ts authorities. Congress has multiple tools at its disposal to do so. It can hold oversight hearings—in fact, congressional committees regularly hold hearings related to oversight of the FBI. The use and effectiveness of the Guidelines should figure more prominently in those hearings, or separate hearings should be scheduled. Congress also could choose to task the General Accounting Office (GAO) with responsibility for conducting audits of the FBI’s use of the Guidelines. While the GAO has statutory authority to access data, documents, and personnel, the FBI is not always entirely cooperative.289 FBI officials must insist that employees cooperate fully with any congressional or GAO reviews. AT: Harm of Surveillance is Subjective Chilling from surveillance makes the harms objective Fisher, 4 --- Associate Professor of Law and Director, Center for Social Justice, Seton Hall Law School (Winter 2004, Linda E., Arizona Law Review, “Guilt by Expressive Association: Political Profiling, Surveillance and the Privacy of Groups,” 46 Ariz. L. Rev. 621, Lexis, JMP) 2. Objective Harm? A threshold question in this inquiry is whether and under what circumstances the harms of surveillance outlined supra are sufficiently objective and serious to outweigh the Government's assertion of a compelling need for domestic security purposes. A related, and narrower, formulation of this issue is whether, despite an assertion of harm that is supported by some evidence, a group subjected to surveillance has suffered objective harm sufficient to render the claim justiciable. I explore the issues of harm and standing here because they illuminate the types of harms courts have considered both direct and serious. In 1972, the Supreme Court held in Laird v. Tatum n192 that plaintiff antiwar activists, complaining that an Army intelligence surveillance program chilled their First Amendment expression, had no standing under Article III because the harm they alleged was subjective. According to the five-to-four majority opinion, plaintiffs alleged only that the existence of the program chilled their expression, not that they themselves were targeted for surveillance that caused them direct harm. n193 These allegations were considered too indirect and tenuous to render the claims justiciable. n194 [*654] The Court distinguished a number of previous cases in which it had allowed standing based upon alleged chilling effects. n195 According to the majority, the governmental action challenged in those cases, to which the plaintiffs were subject, was "regulatory, proscriptive, or compulsory." n196 Therefore, those plaintiffs faced an objective harm - the government likely would act directly against them in a foreseeable way if they did not conform their conduct to the challenged standard. n197 The opinion thus left open the possibility of justiciability in cases where plaintiffs were directly targeted or otherwise affected by surveillance that caused them specific, foreseeable harm. n198 [*655] Indeed, in Meese v. Keene, the Court subsequently held that a state senator who wished to show Canadian films on acid rain presented a justiciable claim that the Justice Department's labeling of these films as "political propaganda" would cause him objective harm. n199 Although the designation did not prohibit showing the films, the senator claimed he was deterred from doing so because his reputation would suffer, adversely influencing his career. n200 An opinion poll buttressed his claim. n201 The likely reputational harm constituted an injury sufficiently objective to confer standing. n202 Since Laird, numerous lower courts have held political surveillance claims justiciable where the surveillance targeted a particular group or individual. n203 However, courts have not agreed on the particular type of harm that must result from the surveillance to make a claim justiciable. Some have required merely that the surveillance have "chilled" a plaintiff's freedom of association or expression, n204 while others have required specific, noticeable harm such as the loss [*656] of a job opportunity. n205 In addition, several courts have required a showing of bad intent, which can be circumstantial and inferred from outrageous police conduct. n206 [*657] Other courts have applied Laird straightforwardly and held surveillance claims nonjusticiable. n207 But, at the very least, the line between subjective and objective harm is appropriately crossed when an individual is able to assert that she was chilled from exercising her rights to expressive association because she was a target of surveillance and that she was harmed in specific ways, such as loss of reputation, or that the defendants' intent was illegal. This sort of harm is objective. AT: Don’t Solve State / Local Surveillance Continued federal surveillance in these particular contexts sends a dangerous signal that discourages state and local agencies from adopting stronger federal standards SF Chronicle, 14 (12/23/2014, Chronicle Staff Report, “Obama administration’s new racial profiling guidelines don’t go far enough,” http://www.sfgate.com/opinion/editorials/article/Obama-administration-snew-racial-profiling-5951702.php, JMP) The Obama administration’s new guidelines about racial profiling were released last week, replacing the Bush administration’s 2003 guidance. The administration didn’t release them in response to national protests over several recent cases of white police officers killing unarmed black men, but the timing is interesting. The new guidelines point out the limitations of the federal response to such cases — and also show how difficult it is to change practices of racial profiling. The new rules prohibit federal officers, such as the FBI and the Secret Service, from profiling based on race, ethnicity, national origin, gender, religion or sexual orientation. Federal agents can only take these factors into consideration if they are looking for a specific subject who fits that category. They can’t simply sweep up certain groups in a search for criminal behavior. Attorney General Eric Holder ordered the review in 2009. At the time he noted that racial profiling destroys community trust in law enforcement and the justice system, and that, much of the time, it doesn’t even work. So why is the federal government still allowing racial profiling at airports and border checkpoints? The new federal guidelines are simple and humane, and they will cover many federal officers. But it’s disappointing that the administration chose to exempt not only border and airport security screening, but also crucial federal personnel like military officers. The new guidelines won’t do much for local communities struggling with racial bias in their police departments either: The guidelines are not binding on local and state police agencies. Only local law enforcement officers who are participating in federal task forces will need to abide by the new policy. The administration has said that it hopes local police will eventually adopt the federal standards. But by making the policy optional, it’s undercut its own argument. And the decision to exempt many of the most sensitive federal agencies sends the message that local law enforcement need not take this seriously. We’re glad to see these guidelines, and we’re certain that federal officers will be pleased with the results they get from employing them. But the administration needs to go further. Racial profiling isn’t acceptable for anyone. We solve state and locals too --- they often utilize federal funds and collaborate with federal agents The Leadership Conference on Civil and Human Rights, 15 (2/24/15, The Leadership Conference on Civil and Human Rights, “Re: Concerns with the U.S. Department of Justice Guidance for Federal Law Enforcement Agencies Regarding the Use of Race, Ethnicity, Gender, National Origin, Religion, Sexual Orientation, or Gender Identity,” http://www.cair.com/images/pdf/2015-02-24TheLeadershipConferenceSign-OnLetterReDOJGuidanceRevisions.pdf, JMP) 4. Finally, the new Guidance does not take any steps to prohibit profiling by state and local law enforcement agencies, except while such agencies are participating in a “federal law enforcement task force.” Yet, as described above, state and local law enforcement agencies like the NYPD, the Ferguson Police Department, and the Cleveland Police Department have encounters with community members every day that raise serious concerns about discriminatory policing.4 State and local law enforcement intelligence fusion centers also collect substantial amounts of personal data about individuals with little oversight, though they often utilize federal funds and involve collaboration with federal agents and analysts. The new Guidance does not mandate that fusion centers take steps to eliminate policing practices that target people based on race, ethnicity, national origin, religion, or other protected categories. DOJ should announce a policy of greater accountability for police agencies that receive federal funds: a. DOJ should condition federal funds to state and local law enforcement agencies on whether the agency has adopted a policy prohibiting the use of race, color, religion, national origin, sex, sexual orientation, and gender identity as a factor in its law enforcement activities, absent suspect-specific information that includes a racial, ethnic, religious or other protected category identifier. DOJ has authority to impose these requirements under Title VI of the Civil Rights Act of 1964, the Omnibus Crime Control and Safe Streets Act of 1968 ("the Safe Streets Act"), and the Violence Against Women Act of 1994 ("VAWA") as amended. Independent of these statutes, DOJ has additional authority under the authorizing statutes for DOJ-funded programs to adopt reasonable conditions to ensure federal funds are used in a manner that is not arbitrary and is consistent with statutory program goals. DOJ should use this authority to codify protection from discrimination based on sex, sexual orientation, and gender identity in program regulations where not already covered by applicable statute. If the agency fails to adopt such a policy, and disparities based on race, religion, national origin, sex, sexual orientation, or gender identity are found within their policing policies and practices, then DOJ should use its existing authority under Title VI of the Civil Rights Act of 1964, the Safe Streets Act of 1968, VAWA, and the DOJ program authorities to demand compliance or initiate termination proceedings. b. DOJ should engage in compliance reviews of select state and local law enforcement agencies and expand these reviews to all local law enforcement agencies that receive funding, either directly or indirectly from DOJ, to determine whether they are complying with the above requirements in all of their law enforcement activities. c. DOJ should announce that going forward, in order for a state/local agency to be able to “attest” to its Title VI, Safe Streets Act, and VAWA compliance, and compliance with any additional program nondiscrimination regulations, the agency must have a policy prohibiting profiling based on the above factors, publicize the policy, and provide training to their officers on how to comply with the policy. d. DOJ should enhance its training programs for law enforcement agencies on how to comply with all applicable nondiscrimination laws and regulations. The Office of Justice Programs and the Civil Rights Division are doing some of this now, but not in a very systematic way. e. As part of this new policy, DOJ should commit to providing materials in furtherance of the above requirements to all police agencies that receive federal funds, including model policies, model training materials, etc. f. DOJ should require all state and local law enforcement agencies that receive federal funds to collect data on the use of race, ethnicity, gender, national origin, or religion in their law enforcement activities. AT: Don’t Solve All Surveillance FBI surveillance outweighs alternative causalities --- it plays the central role in domestic surveillance Harris, 14 --- senior staff writer at Foreign Policy, covering intelligence and cyber security (7/9/2014, Shane, “The FBI’s Dirty Little Secret; The NSA wasn't the only one snooping on ordinary Americans,” http://foreignpolicy.com/2014/07/09/the-fbis-dirty-little-secret/, JMP) Believe it or not, some officials at the National Security Agency are breathing a sigh of relief over Glenn Greenwald’s new exposé on the government’s secret surveillance of U.S. citizens. That’s because it’s the FBI that finds itself in the cross-hairs now, in a story that identifies by name five men, including prominent Muslim American civil rights activists and lawyers, whose emails were monitored by the FBI using a law meant to target suspected terrorists and spies. The targets of the spying allege that they were singled out because of their race, religion, and political views — accusations that, if true, would amount to the biggest domestic intelligence scandal in a generation and eclipse any of the prior year’s revelations from documents provided by leaker Edward Snowden. After a year in which the digital spies at the NSA have taken unrelenting heat on Capitol Hill and in the media, it’s rare for the FBI to come under scrutiny — and that’s surprising, given the central role that the bureau plays in conducting surveillance operations, including all secret intelligence-gathering aimed at Americans inside the United States. "It’s an important point of distinction that it was the FBI directing this, not the NSA," said a former senior intelligence official, welcoming the shift in focus away from the beleaguered spy agency to its oftenoverlooked partner. Ever since the 9/11 attacks, the FBI has been frequently cast as the judicious and measured army of the war on terror, the home to interrogation experts who know how to coax secrets out of detained terrorists without resorting to the "enhanced techniques" of the CIA. But now, the FBI, and with it the Justice Department, finds itself exposed for spying on Americans who were never accused of any crime, and in the position of having to defend and explain its reasoning for taking that intrusive step. Greenwald’s story is based on a spreadsheet purportedly compiled by the NSA showing individual surveillance targets, identified by their email addresses. (The government has neither confirmed nor denied the document’s authenticity.) NSA technology and personnel were undoubtedly used to monitor the targets’ email accounts, but the spreadsheet calls the FBI the "responsible agency" for surveilling the five men named in the story — as it would be for any targets located inside the United States. All five, including an Iranian-American professor at Rutgers University and a prominent Muslim civil liberties leader, told the Intercept that they deny any involvement with terrorists or spies. None has been accused of terrorism, espionage, or any other crime. One, Faisal Gill, even held a senior position at the Department of Homeland Security in George W. Bush’s administration and was granted a government security clearance. What they do have in common is their Muslim heritage and Middle Eastern or South Asian extraction. And some of the men say that’s precisely why they were targeted. "[T]he FBI has been mapping a broad spectrum of communities, including American Muslim communities, the African American community and Latino American communities, without any basis for individualized suspicion," the Council on American-Islamic Relations, whose executive director, Nihad Awad, was among the five men reportedly spied on by the FBI, wrote in a letter, co-signed by numerous civil rights groups, to President Barack Obama on Wednesday, July 9. "What we’ve seen is mounting evidence of abuse," said former FBI agent Mike German, pointing to the latest revelations as well as a recent report in the Washington Post that examined the NSA’s so-called incidental collection of the communications of Americans swept up while the agency spied on foreigners. "There needs to be a much more thorough investigation and much more transparency to ensure Americans that these programs are being operated in the way they’re being told and in the way that Congress and the courts are being told," said German, now a fellow at the Brennan Center for Justice’s Liberty and National Security Program in New York. Offcase Answers AT: DA Terrorism --- Secrecy Link Answers Plan won’t tip off anyone --- making constraints public triggers effective enforcement Berman, 11 --- Counsel in the Liberty and National Security Project at the Brennan Center for Justice (Emily, “DOMESTIC INTELLIGENCE: NEW POWERS, NEW RISKS,” http://brennan.3cdn.net/b80aa0bab0b425857d_jdm6b8776.pdf, JMP) ***note --- DOIG = Domestic Investigative Operational Guidelines which implement the Attorney General’s Guidelines Perhaps most troublingly, the rules regarding the most intrusive investigative techniques permitted in the absence of factual predicates for investigation—pretext interviews and undisclosed participation in religious and political gatherings—are redacted entirely (despite being labeled unclassified) from the publicly available DIOG. So whether the DIOG aims to mitigate any of the troubling aspects of these techniques is impossible to say. And if they do impose additional restrictions, the fact that they do so secretly limits their effectiveness as a constraint—if no one outside the Justice Department knows the rules to which agents are expected to adhere, enforcement of those rules becomes a matter of FBI grace.149 ***footnote #149 149 The FBI likely would argue that shielding its investigative techniques from public scrutiny is necessary to prevent from evading detection the potential criminals and terrorists that investigations are meant to thwart. And in the context of particular investigations, this concern is a significant one. With respect to cloaking entire policies in secrecy, however, this justification rings hollow. Simply publishing the conditions under which an FBI agent is permitted to attend religious gatherings and what sort of information she is permitted to collect there will not tip off anyone that an agent plans to visit a certain place of worship at a certain time in order to discover whether anyone is advocating use of violence there. Just as the rules regarding the permis-sible use of electronic surveillance are published in the U.S. Code, the rules regarding other investigative techniques should be subject to public scrutiny. AT: DA Terrorism --- Info Overload & FBI Overstretch Turn Surveillance doesn’t increase security and only undermines terror prevention by alienating key communities, causing info overload and overstretching FBI resources Berman, 11 --- Counsel in the Liberty and National Security Project at the Brennan Center for Justice (Emily, “DOMESTIC INTELLIGENCE: NEW POWERS, NEW RISKS,” http://brennan.3cdn.net/b80aa0bab0b425857d_jdm6b8776.pdf, JMP) II. The New Changes Should Be Reconsidered The expansion of FBI powers contained in the 2008 Guidelines will have predictable consequences. Lessons of the FBI’s history teach us that, in the absence of sufficient oversight and limitations on intelligencecollection activities, civil liberties will be trenched on in our pursuit for security. This could happen in several areas. First, the ability to conduct “assessments” without any factual predicates is almost certain to lead to undue intrusions into the privacy of law-abiding Americans. Second, anecdotal evidence suggests that the Guidelines already have chilled First-Amendment-protected activity, and likely will continue to do so. Third, the burden of these civil liberties concerns likely will fall disproportionately on Muslims and persons of Arab or South Asian descent, as agents whose investigative decisions are unconstrained by objective factual criteria will be more likely to fall back on conscious or subconscious biases. This, in turn, will make the FBI less effective in countering the terrorist threat as targeted communities are alienated and rendered less willing to cooperate with law enforcement. Moreover, studies show that profiling is not an effective tool. Finally, we cannot be sure that the FBI’s newfound collection authority does, in fact, lead to increased security. As the Washington Post’s recent series of reports on “Top Secret America” makes plain, the scope of America’s surveillance-industrial complex is so massive, with so many agencies engaging in overlapping and redundant activities, it is impossible to determine the efficacy—from a security standpoint—of the billions of dollars we spend and the volumes of information the government collects.150 Some even argue that this increased scope of collection will make us less safe, because the collection of vast amounts of information unrelated to factual indications of wrongdoing or threat could overwhelm the Bureau’s ability to analyze effectively and employ the information it has collected. In the face of these adverse effects, the executive branch has yet to articulate persuasively any countervailing operational considerations that would justify retaining the most recent changes to the Guidelines. Thus the powers they confer should be curtailed. In any event, the implementation of all investigative powers should be monitored closely and subjected to strict oversight for both compliance and effectiveness. A. The Guidelines’ Adverse Effects on Civil Liberties and Law Enforcement Effectiveness On their face, and in light of the history of intelligence-collection in this country, the Mukasey Guidelines raise concerns that they might lead to significant imposition on Americans’ civil liberties. In examining the varied ways in which this result might come to pass, the Guidelines’ overbreadth becomes clear. Moreover, the need for vigilant, regular review of the FBI’s authorities, as well as internal and external oversight mechanisms becomes all the more evident. 1. Threat of Privacy Invasions The new Guidelines may pose significant threats to Americans’ privacy. They permit the collection of vast amounts of information without any factual predicate and with no supervisory approval. Add to this expansive authority the Guidelines’ encouragement to agents to “take the initiative” and be proactive,151 and it seems likely that the FBI will be amassing substantial amounts of information on many Americans who have never been suspected of wrongdoing. The more the FBI sees itself as an intelligence-collection agency, the more robust these collection-without-suspicion activities are likely to be. Such collection seems to be at the heart of the government’s counterterrorism efforts, both inside and outside the FBI. It is important to note that the FBI Guidelines are just one small part of a broader surveillance scheme.152 Each element of this scheme is engaged in aggressive information-collection and analysis. An illustration comes from the National Security Agency (NSA), the agency primarily responsible for the collection and analysis of various forms of communication. The NSA is building vast new facilities to increase its information-storage capacities.153 One facility, in Utah, measures one million square feet; another, in San Antonio, is roughly the size of the Alamodome.154 The amount of data expected to reside in these facilities has been estimated in the Yottabytes (as an indication of the size of a Yottabyte, numbers beyond Yottabytes have not yet been named).155 The fact that the FBI will likely be gathering information on law-abiding Americans is particularly troubling in light of the methods it is now authorized to use. Going to political meetings or religious services to collect information about what takes place there and who attends; pretending to be an investigative target’s new neighbor or business associate, or stationing agents outside the target’s home or office—even having them followed—so that their movements are tracked day and night; accessing without a court order telephone and e-mail subscriber information. These are highly intrusive and invasive techniques, and Americans have a right to expect that they will not be subject to such government intrusion unless the government has some objective reason to suspect illegal activity or wrongdoing. The collection and analysis of information from existing sources—another technique that FBI agents can employ in the absence of a factual predicate—seems less troublesome at first blush. After all, why shouldn’t the FBI be permitted to access information already in the government’s possession, or information available on the internet? In fact, however, the sophisticated collection and analysis of such information by FBI is significantly more revealing than a simple Google search that a private individual might conduct. Through public, commercial, and government databases, the FBI can readily collect vast amounts of employment information, residential information, financial information, information about shopping habits, and the like. This information can then be subjected to algorithmic data-mining, stored, or disseminated to other government databases and agencies. The threat here is far from theoretical. Like the NSA, the FBI’s National Security Branch has amassed vast amounts of information in its Analysis Center (NSAC), which houses multiple databases “[c]omposed of government information, commercial databases and records acquired in criminal and terrorism probes.”156 The stored information includes international travel records of citizens and aliens, financial forms, hotel and rental car records, a log of all calls made by federal prison inmates, and a reverse White Pages with 696 million names and addresses tied to U.S. phone numbers.157 The FBI plans to expand the data set to include yet more travel records, as well as tax records from non-profit organizations and multiple databases whose descriptions are redacted in a now-available (though formerly classified) document.158 Most Americans would agree that the FBI should not be permitted to compile a dossier on every American. But the accumulation of these databases into one facility means that such a dossier is just one mouse-click away. Accordingly, all collection and use of information—even publicly available information—must be effectively policed. The prospect of expansive collection of information leads to another concern. Even if information the FBI collects at the assessment stage provides no basis for further investigation—indeed, even if it wholly exonerates a group or individual from suspicion—that information will remain in government databases indefinitely for analysis and dissemination to other agencies. According to the Guidelines, since investigative “activities also provide critical information needed for broader analytic and intelligence purposes to facilitate the solution and prevention of crime, protect the national security, and further foreign intelligence objectives,” all information collected “at all stages of investigative activity is … to be retained and disseminated for these purposes … regardless of whether it furthers investigative objectives in a narrower or more immediate sense.”159 To this end, the Guidelines include broad information-sharing provisions.160 While it is indisputable that the FBI should be permitted to share appropriate information with other government agencies as well as local law enforcement for legitimate law enforcement purposes, the prospect of keeping and sharing large amounts of information about Americans under no suspicion of wrongdoing raises serious privacy concerns. These possible invasions of privacy raise concerns not only because of their infringement on Americans’ fundamental rights. They also breed cynicism, resentment, and distrust towards law enforcement and government officials. Revelations of unwarranted invasions of privacy raise the specter of historic, Hooverera FBI excesses. To be sure, today’s FBI bears little resemblance to that unregulated agency shrouded in secrecy. But federal law enforcement agencies posses the authority and the technology to engage in invasions of privacy far beyond those that took place in the Hoover era. And even if such excesses are the exception rather than the rule today, concern over systemic abuse arises with each isolated instance of overreaching. 2. Chill to First-Amendment-Protected Activity The FBI’s broad authorities also risk causing significant chill of First-Amendment-protected religious and political activity. As First Amendment expert Floyd Abrams noted with respect to the pre-Guidelines FBI’s impact on free speech, “[t]he ‘chill’ on speech was real; Hoover intended just that and achieved just that.”161 Under the Guidelines, agents are permitted to attend all gatherings, events, political rallies, and religious services open to the public. How will they decide which ones to attend? If history provides any lessons, such decisions will often be based on some form of religious or political profiling. Certainly the Hoover-era operations were targeted at minorities and political dissidents, aiming to harass and disrupt their operations.162 But even in the post-Guidelines era, innocent political and religious groups have been targeted and investigated. Recall the 1980s investigation into CISPES, the activist organization opposed to Reagan-era El Salvador policy. The investigation, and others like it from that same era, gathered a wealth of information on activist groups, with investigations of particular groups sometimes triggered solely on ideological similarity or association with other groups already under investigation.163 Investigators monitored meetings, rallies, demonstrations, religious services, and other protected activity.164 But the CISPES investigation produced “no reliable information of planned violence or other illegal activity.”165 Another example is the Cold-Warera Library Awareness Program, which consisted of regular FBI visits to public and university libraries to seek information about the readers of unclassified scientific and technical journals, sometimes asking “librarians to be wary of ‘foreigners’ or persons with ‘East European or Russian-sounding names.’”166 In the post-9/11 context, one study catalogs the experiences of dozens of law-abiding members of the Muslim, Arab, and South Asian (MASA) communities upon returning to the United States from abroad. They have been subjected to intrusive questioning by customs agents about their religious practices, political views, and charitable giving, as well as searches of their laptops, cell phones, and digital cameras, pursuant to a policy that permits such questioning and searches absent any individualized suspicion of wrongdoing.167 And FBI Director Robert Mueller ordered all FBI branch offices to count the number of mosques within their jurisdiction as a starting point for proactive investigation of potential terrorists.168 Imagine an FBI agent attending a religious service in which the priest, reverend, rabbi, or imam engaged in stark anti-government rhetoric, criticizing American foreign policy in the Middle East and sympathizing with the desire of residents of Middle Eastern countries to expel nonviolently U.S. military forces. Such expression is at the very core of First Amendment protections—political speech neither intended nor likely to incite actual violence, yet adamantly critical of U.S. actions. Americans are entitled to voice these sorts of opinions, and they should not necessarily trigger FBI intelligence-gathering activities that ultimately are likely to chill such expression. Yet such rhetoric, if observed in a mosque, likely would draw additional government attention. In fact, there are a range of First-Amendment-protected activities that agents can take into account during the assessment stage to build a profile of traits that, taken together, are deemed suspicious. According to the FBI itself, potential indicators of terrorist activity include taking notes, drawing diagrams, espousing unpopular views,169 or taking photographs,170 and other law enforcement organizations have expressed the view that increased religiosity is suspicious as well.171 The FBI’s aggressive investigation and infiltration of mosques has already had a profound chilling effect on the exercise of fundamental rights, particularly religious freedoms. According to the New York Times, some Muslims have “canceled trips abroad to avoid arousing suspicion. People are wary of whom they speak to. Community groups say it is harder to find volunteers. Many Muslim charities are hobbled.”172 In the Southern California Muslim community, reports the Los Angeles Times, “some people are avoiding mosques, preferring to pray at home. Others are reducing donations to avoid attracting government attention… . And some mosques have asked speakers to refrain from political messages in their sermons.”173 And while empirical evidence of such claims is hard to come by, “Muslim leaders report a reduction in attendance at mosques, a change in the language used at worship services, a decrease in contributions to Muslim charities, and an erosion of the trust and good will that are essential to the vitality of a religious community.”174 When the FBI sends investigators to question people about their political activities, when it sends agents to attend religious gatherings, when it monitors the calling records of members of the media, it can create a profoundly chilling effect on First Amendment activities. The FBI can hardly pretend ignorance of this effect, given that the agency has, at various points in its history, infiltrated political or religious groups with the express purpose of creating a chilling effect on unpopular or anti-government expression.175 To engage in activities likely to have such an effect, the Bureau should have to show that such an infringement is justified by a particular level of suspicion. Even the power to gather extensive information from public sources can contribute to the threat of First Amendment chill. The FBI can compile publicly available information on religious or political figures, government critics, or members of the media. If it does so based on a distrust of groups or individuals that represent dissenting perspectives, that is just as problematic from a privacy and constitutional standpoint as if those same motivations led to information gathering from non-public sources. Collection and use of information on people’s First-Amendment-protected activities, even where those activities are carried out in the public eye, is simply not appropriate absent a legitimate law enforcement justification. The Guidelines need to exhibit sufficient solicitude for constitutionally protected activity. 3. Dangers of Profiling Permitting investigations without factual predicate and with limited supervisory involvement is overwhelmingly likely to lead to profiling176 on the basis of race, religion, ethnicity, national origin, or political belief. In the absence of constraints imposed by a standard such as reasonable suspicion or probable cause, FBI agents are now free, in many situations, to rely on their own discretion. As we have seen time and again, individuals permitted such discretion in making law enforcement decisions are influenced by their conscious or subconscious biases.177 And this reliance on bias can lead to profiling. Historically, when law enforcement officials have been able to collect intelligence on groups and individuals suspected—without any objective basis—of harboring ill will toward the U.S., the burden of that investigative activity has fallen on groups that espouse disfavored ideologies, minorities, or others who are perceived as threatening.178 Justice Department officials have assured both Congress and the public that “department rules . . . forbid predicating an investigation simply based on somebody’s race”179 or “solely for the purpose of monitoring activities protected by the First Amendment.”180 The question is not, however, whether investigative activity will be motivated by race, religion, national origin, or political belief alone. Problematic profiling consists not only of relying entirely on characteristics like race or religion, but of taking them into account, in the absence of any particularized suspicion indicating that such characteristics are relevant, and making law enforcement decisions based even in part on such factors. Reliance on that criteria—that an officer has engaged in racial profiling only when the single factor, i.e., race, religion, ethnicity, etc., is used to make a law enforcement decision—comes close to defining the problem of out existence. It would not prohibit many inappropriate uses of these characteristics. For instance, it would not prohibit an officer from making decisions based on two factors, such as ethnicity and gender, like investigating males of Arab descent because they are males of Arab descent. Nor would it bar decisions based on the use of race and place, such as pulling over black drivers in white neighborhoods because they are blacks in white neighborhoods. Any meaningful restriction on the use of race, religion, national origin, or political belief would allow such characteristics to be taken into account only when there is some indication that they are relevant to a particular description of someone or some group engaged in particular criminal activities. Moreover, while Justice Department rules place some limits on the use of race only in traditional law enforcement activities, and they include an explicit exception for “law enforcement activities and other efforts to defend and safeguard against threats to national security.”181 Thus the new Guidelines do nothing to prevent allowing race to be considered as a factor in intelligence-collection activities, or in, for example, developing terrorist profiles.182 Because the new Guidelines do not preclude the use of race or religion as a factor, profiling on the basis of “race plus” or “religion plus” the activities listed above can expose a large population of innocent people to the invasion of privacy that comes with being subjected to an FBI preliminary investigation. Indeed, as law enforcement officials told The Associated Press, “[a]mong the factors that could make someone the subject of an investigation is travel to regions of the world known for terrorist activity … along with the person’s race or ethnicity.”183 Thus, for example, every individual of Pakistani origin who travels to Pakistan to visit family members is at risk of being subjected to an FBI investigation merely on that basis. So is every South Asian man who takes a photograph of the Brooklyn Bridge. Indeed, the DIOG explicitly envisions community mapping based on ethnicity. Such activity is justified by the possibility that concentrations of certain ethnic communities provide an opportunity for “identified terrorist subjects from certain countries [to] relocate to blend in and avoid detection.”184 In other words, ethnic profiling is already an express part of agency policy. The profiling risk that the Guidelines pose is not limited to the factors of race, religion, ethnicity, or national origin. They also threaten expressive activity. Admittedly, the Guidelines preclude investigations solely for the purpose of monitoring activities protected by the First Amendment, and when investigations implicate First Amendment rights, there are heightened notice and approval requirements.185 But these minimal precautions are insufficient to negate the Guidelines’ threat to expressive activity. After all, it is much easier to identify those who share the political beliefs or the religion of a particular group of terrorists than to identify and locate those actually plotting harm. It was thus the groups seen to espouse unpopular ideology who were the targets of FBI harassment and disruption during the Cold War. And, more recently, law enforcement officials have inappropriately surveilled, infiltrated, or collected information on anti-war protesters, anti-death penalty groups, and other political dissenters.186 Despite the government’s disavowal of Islam as the enemy, many of our post-9/11 counterterrorism efforts have focused on communities of people who happen to be Muslim, Arab, or South Asian. Many will argue that, because the terrorist threats with which we are most concerned emanate from those espousing an extremist misinterpretation of the Muslim faith, and because many of those hail from majority Arab or South Asian nations, counterterrorism efforts should focus on those groups or on those who come from countries with majority Muslim, Arab, or South Asian populations. But this means of “focusing” investigations is misplaced. To be sure, the threat posed by this sort of violent extremism is real, but in combating this threat we cannot indict the millions of law-abiding people who happen to be part of the communities from which the threat may emanate. In the past, law enforcement organizations have successfully policed groups engaged in organized violence—like the mafia or the KKK—without trenching on the civil liberties of the entire Italian-American or Southern Christian communities. They have also been able to focus on anti-abortion groups that sometimes resort to violence without infiltrating all Catholic and evangelical Christian churches, despite knowing that violent anti-abortion activists are often ideologically motivated. Of course the vast majority of Muslims are not terrorists. Consequently, any counterterrorism policy aimed at collecting information from within those communities, in the absence of a factual predicate indicating that criminal or espionage-related activity is ongoing, will be sweeping in massive amounts of information about law-abiding citizens. There is general consensus that profiling is ineffective; nonetheless, law enforcement has engaged in several tactics targeted predominantly at the Muslim community as a whole, and with unfortunate effects. Indeed these many domestic anti-terror policies do not seem to have made us safer—in fact, the opposite might be true. In some cases, data collected under these programs remains unanalyzed, wasting countless man hours. In other cases, the policies have simply undermined the relationship between the Muslim community and law enforcement, alienating the very people whose cooperation is most essential to effective counterterror efforts. Consider, for example, the many post-9/11 measures—some implemented by the FBI, others implemented by other government agencies—that were targeted directly at the whole Muslim community. In the days and months after the attack, thousands of individuals were subjected to interviews with the FBI.187 While the interviews were labeled as “voluntary,” they took place at the same time as widespread roundups and detentions of Muslim Middle Easterners. Interviewees therefore were likely to fear what might happen should they refuse to talk to government officials. Moreover, while the interviews did not directly concern immigration issues, an interviewee’s immigration status also could render an invitation to participate in a voluntary interview much more coercive than the label “voluntary” might indicate.188 All of these individuals were men hailing from countries with predominantly Muslim populations, even though they had no ties to terrorism and there was no basis to suspect such ties.189 The government also established a mandatory registration program, the National Security Entry-Exit Registration System (NSEERS), which required men over the age of 16 from about 25 countries—countries that have predominantly Muslim populations or are located in the Middle East190—to register with the federal government, be photographed and fingerprinted, and periodically re-register. And in 2004, Operation Front Line, an effort to disrupt potential plots surrounding the presidential election, saw immigration officials target more than 2,500 immigrants, 79% of whom were from Muslim-majority countries. These individuals were asked what they thought of America, whether violence was preached at their mosques, and whether they had access to biological or chemical weapons.191 And the Muslim Advocates’ study of the border-crossing experiences of members of the MASA community revealed what seems to be a pattern of intrusive questioning by customs agents regarding individuals’ religious practices, political views, and charitable giving, as well as searches of their electronic devices.192 The Mukasey Guidelines and the accompanying DIOG both extend to the FBI even more investigative discretion than it enjoyed in the aftermath of 9/11 and seem to embrace certain forms of religion- or ethnicity-based decisionmaking. The likelihood of investigative activity focused disproportionately on discrete racial, ethnic, religious, or political groups—such as MASA communities or political dissenters—is significant. The likelihood of a return on the investment of resources such a policy represents is low. At the same time, the costs it imposes are quite high. Again the post-9/11 programs are illustrative. Two years after the FBI conducted its “voluntary” interview program, neither DOJ nor FBI had bothered to analyze the data collected in the interviews and had no plans to do so.193 According to agents, the interviews were a waste of time and “produced exactly no useful information.”194 In the two years after 9/11, the NSEERS program registered over 83,000 individuals, sought out 8,000 men of Arab and Muslim descent for FBI interviews, and placed more than 5,000 foreign nationals in preventive detention. Of those thousands of individuals, not one was convicted of a terrorist crime; the government discontinued the mandatory periodic re-registration element due to its inefficiency.198 And the 2004 Operation Front Line effort to disrupt potential plots surrounding the presidential election failed to yield actionable information. None of those interrogated were charged with national security offenses; the offenses that were charged were largely immigration violations.199 Together, these initiatives represented a massive investment of law enforcement resources in unpredicated investigative activities that yielded negligible security gain. These failures should come as no surprise. Instrumental objections to racial profiling as a law enforcement strategy are legion and well-documented.200 And the Justice Department itself has acknowledged that racial profiling does not work.201 There are, of course, extreme examples of failed efforts to use profiling as a law enforcement tool. For example, “the FBI sifted through customer data collected by San Francisco-area grocery stores in 2005 and 2006, hoping that sales records of Middle Eastern food would lead to Iranian terrorists.”202 But there is general consensus among experts that even less extreme versions of racial, ethnic, or religious profiling are also ill-advised. In fact, in the wake of 9/11, a group of senior U.S. intelligence specialists warned against using such profiling as a means of combating terrorism.203 One of them noted that “fundamentally, believing that you can achieve safety by looking at characteristics instead of behaviors is silly.”204 Even assuming that an accurate racial, ethnic, religious, or political profile could be generated for some crimes—a dubious proposition—aspiring criminals could simply adapt to the profile, exploiting it to evade detection. In the context of terrorism, would-be perpetrators anticipate and work around profiling practices, choosing “front men” who do not fit the profile. For example, the perpetrators of terrorist plots against Israeli air passengers have included, among others, a heavily pregnant Irishwoman (herself an unwitting courier), Japanese men, and a Nicaraguan.205 Similarly, suicide bomb plotters in Israel have adjusted to profiling by selecting women and children as bombers and by disguising bombers in secular or even Orthodox Jewish clothing.206 And FBI Director Mueller has recognized that “the threat from radicalization has evolved ….A number of [recent] disruptions occurred involving extremists from a diverse set of backgrounds, geographic locations, life experiences, and motivating factors.”207 In other words, there is no such thing as a terrorist “profile.” The ineffectiveness of profiling as a law enforcement tactic (not to mention the constitutional problems it raises208) led the Justice Department to ban the use of race as a factor in determining whether and whom to investigate in the general criminal context. The Department’s prohibition, however, does not extend to other aspects of minority status, such as religion or political ideology; nor does it apply to “law enforcement activities and other efforts to defend and safeguard against threats to national security or the integrity of the Nation’s borders.”209 The national security exemption, in particular, is a puzzling one. While one might argue about whether national security justifies the individual indignities imposed by profiling, the Justice Department has never explained why national security justifies using a technique that the agency itself describes as ineffective. In any event, the new Guidelines, which cover criminal investigations as well as national security and domestic intelligence collection, leave the door to profiling wide open. Reliance on racial, ethnic, religious, or political profiling is not only ineffective; it is also affirmatively counterproductive in several respects. First, profiling can waste resources210 by allocating money and manpower inefficiently.211 Relatedly, when law enforcement officials focus on traits like race or religion, they are more likely to overlook signs that actually do indicate heightened likelihood of criminal intent.212 The shortcut that profiling may seem to provide is simply no substitute for the investigation of substantive leads indicating possible criminal or terrorist activity. Profiling on the basis of race, religion, or ethnicity also harms counter-terrorism efforts by alienating MASA communities in the U.S. In discussing racial profiling of African Americans, the Justice Department has warned of “a strong connection between perceptions of race-based stops by police and animosity toward local and state law enforcement.” Such animosity, in turn, makes individuals less inclined to report crimes and suspicious activity; to answer police inquiries and testify as witnesses; to affirmatively come forward with evidence; and to serve as impartial, open-minded jurors. The need for healthy police-community relations is especially strong in counterterrorism work. To foil potential attacks, law enforcement needs accurate tips. Such tips are most likely to come from “people who live in the communities where sleeper cells reside and can tell authorities who’s new in a neighborhood and who seems to have income without holding a job.”214 A recent example comes from the case of five Washington, D.C.-area Muslim men arrested in Pakistan on suspicion of traveling there to join al Qaeda. It was the men’s families who alerted authorities when they became suspicious of their sons’ activities.215 And the prosecutions of the so-called “Lackawanna Six” came only after “Lackawanna’s Yemeni community itself brought the men to the FBI’s attention.”216 Successful counterterrorism policy thus requires forging a cooperative relationship with communities likely to learn of impending terrorist plots.217 Such a cooperative relationship can exist only if there is confidence on the part of the relevant communities that the means of investigating, disrupting, and prosecuting terrorist activity are legitimate, without bias, and consistent with due process of law.218 By broadly targeting the very people most likely to be able to help, however, the FBI destroys this confidence, sowing the seeds of distrust and contentiousness rather than cooperation and partnership.219 Profiling thus interferes with law enforcement agents’ essential task of developing relationships with the communities they police. FBI Director Mueller denies that the new Guidelines have this effect, but there is significant evidence to the contrary. Distrust of law enforcement, along with the government’s practice of using preliminary interviews as a basis for later pressure to act as an informant or even as the basis for criminal charges, has led many community groups to “strongly urge individuals not to speak with law enforcement officials without the presence or advice of an attorney.”220 And the infiltration of mosques has caused increased tension nationwide between Muslim communities and law enforcement, leading several Muslim groups to threaten to suspend most contacts with the FBI over the issue.221 Several recent investigations where informers have infiltrated mosques and promoted terror plots “have sown a corrosive fear” among many Muslims “that F.B.I. informers are everywhere, listening.”222 And the use of informants in mosques in Southern California has “frayed relations between the FBI and Muslims” to the point that one Muslim community leader observed that “people cannot be suspects and partners at the same time.”223 An empirical study of the Muslim-American community in New York indicates that the tendency to withdraw cooperation with law enforcement based on perceptions of profiling is not merely anecdotal but represents a community-wide trend.224 Perhaps it is no coincidence that the families who reported their suspicions regarding their missing sons hail from the jurisdiction of the FBI’s Washington field office, which has engaged in productive outreach to the local Muslim and Arab communities, meeting with leaders, fielding questions, and participating in community activities.225 So in the absence of sufficient oversight and accountability mechanisms in place to curtail inappropriate use of factors such as race, religion, national origin, or political opinion, investigators’ efforts to detect terrorist plots could be less effective under the new Guidelines. Conversely, requiring more tailored collection of information based on factual predicates could increase the likelihood that the government will identify and obtain information that is actually effective in preventing terrorist activity. Profiling has other negative effects as well. Religious or ethnic profiling imposes significant social burdens on the profiled community. It causes humiliation, feeds “social opprobrium that leads to hate crimes”226 and discrimination, and perpetuates racial inequality. It sends the message to minorities that they are viewed at all times as potential criminals; that they are not valued members of society; and that they cannot rely on the police for protection.227 This message risks breeding anger, cynicism, and lack of respect for government more generally.228 As one report put it, “[o]ver the long term, [racial profiling] leaves persons of color with a sense of powerlessness, hostility, and anger.”229 Moreover, profiling that targets minorities exaggerates any differences that do exist between that community and the population at large. Significantly higher rates of minority interaction with law enforcement perpetuate and exacerbate inequality, negative stereotypes about minorities, and discrimination and violence based on these stereotypes.230 No community should be singled out and burdened with the consequences that flow from being treated as if its members are more likely to engage in criminal or terrorist activity. 4. Risks of Excessive Collection Effective crime and terrorism prevention is not necessarily aided by the collection of more information; it is aided by the collection of more of the right information, and the tools to analyze that information effectively. If increased investigative discretion and the expansion of unfocused investigative activities results in crowding government databases with irrelevant information, it could render investigative efforts less effective. Take the Guidelines’ permissiveness regarding the collection of information at the assessment stage. Allowing the FBI to target for investigation people for whom there is no factual predicate of criminal activity or threatening behavior increases the amount of information, already vast, that the Bureau will collect. This, in turn, increases the raw material that analysts and agents must examine and analyze. According to FBI Director Mueller, “the FBI receives well over 100 different feeds of criminal and terrorist data from a variety of sources.”231 Consequently, “[i]t is a great challenge to ensure that intelligence analysts are able to efficiently understand and analyze the enormous volume of information they receive.”232 Yet a recent Inspector General report noted that the Bureau had failed to review “significant amounts” of wiretapped phone calls and intercepted emails, in part due to a lack of qualified translators.233 Even useful information can only further our security interests if we devote the time and resources to effective analysis—a task that increases in difficulty as the volume of information rises. Resources might be better allocated to more analysis capacity, rather than more (over)collection. Note that high profile “intelligence failures” have, as a rule, resulted not from the lack of information, but from the inability to effectively process that information. Consider the recent Christmas Day bombing attempt aboard flight 253 from Amsterdam to Detroit. Government agencies were in possession of all of the pieces of information necessary to have detected and prevented the bombing plot.234 But intelligence agencies were unsuccessful in “connecting the dots” or in moving aggressively to identify the threat posed to the U.S. homeland by Al Qaeda in the Arabian Peninsula.235 Similarly, while some have cited the 9/11 attacks as a justification for expanding the executive’s information-gathering authorities, the failure of U.S. intelligence and law enforcement agencies to detect and prevent the 9/11 plot also resulted, in part, from their failure to examine or follow up on information that they had already collected. 236 Another stark example of this phenomenon comes from across the Atlantic. A government report about the investigation into the British subway bombings of July 7, 2005, revealed that two of the attack’s perpetrators had been on law enforcement’s radar prior to the bombings.237 In fact, the mastermind of the plot, Mohammed Sidique Khan, had crossed paths with British law enforcement on multiple occasions dating back to 1993.238 Khan and a co-plotter, Shehzad Tanweer, had been identified as “desirable” targets of further investigation and had surfaced four times during an investigation into a plot to detonate fertilizer bombs in the U.K.239 But due to a lack of resources, the U.K. police never followed up on the men. In fact, “resources were so stretched agents could not even assess whether ‘desireable’ targets should be examined in more detail.”240 The lesson is clear: if limited investigative resources are diverted into massive, untargeted surveillance efforts—as appears to have been the case in Great Britain241—fewer man hours are available to pursue leads turned up during other investigations or to analyze information already in the government’s possession.242 These examples illustrate that the FBI’s investment of time, energy, and resources might be more fruitfully spent on efforts to remedy the problems identified by the White House review of the Christmas Day incident—better coordination among elements of the intelligence community; improving information technology capabilities; and ensuring a comprehensive, functioning process for tracking terrorist threat reporting.243 Suspicionless surveillance backfires --- leads to excess useless info and undermines critical community trust German, 12 --- Senior Policy Counsel, ACLU Washington Legislative Office (3/9/2012, Michael, “FBI Official Agrees with ACLU: Suspicionless Surveillance is Ineffective and Counterproductive,” https://www.aclu.org/blog/fbi-official-agrees-aclu-suspicionless-surveillance-ineffective-andcounterproductive, JMP) This week a high-level FBI official made some welcome comments on the NYPD's spying on New York City's Muslim communities and organizations that mirror the ACLU's own position on the suspicionless surveillance. As you know, we at the ACLU we have long raised concerns about increasing levels of suspicionless surveillance by law enforcement and intelligence agencies, whether enabled though legislation, like the Patriot Act, Foreign Intelligence Surveillance Amendments Act, or proposed cybersecurity bills; or though policy and programs, like the amendments to Attorney General Guidelines (AGG) governing the FBI, state and local intelligence fusion centers, and "suspicious activity reporting" programs, to name but a few. The ACLU's argument is suspicionless surveillance inappropriately invades the privacy of innocent persons and failing to require a factual basis creating reasonable suspicion and probable cause before initiating surveillance opens the door to biased policing, leading to unconstitutional racial and religious profiling and spying on political activists in violation of their First Amendment rights. Based on my experience in law enforcement, I have also argued that suspicionless surveillance is ineffective and counterproductive as a security measure because it fills intelligence databases with useless information and undermines community support for legitimate law enforcement and intelligence activities directed at real threats. Now, we are heartened to hear that the FBI agrees with us (or at least one high-level FBI official does). Newark, N.J., FBI Special Agent in Charge (SAC) Michael Ward has spoken out in opposition to the NYPD spying program: "But (the NYPD) coming out and just basically mapping out houses of worship and minority-owned businesses, there's no correlation between the location of houses of worship and minority-owned businesses and counterterrorism" work, he continued. Ward also said there should be "an articulable factual basis" for domestic intelligence collection, such as a 'specific reason why we're looking at this location, this person'." He went on to describe the negative impact these types of operations have on the FBI's relationship with the Muslim community. We couldn't agree more and are pleased to have an FBI official of Ward's stature and experience making such a clear denunciation of suspicionless surveillance. Unfortunately, the view that both Ward and the ACLU share isn't reflected in the FBI's policies, or its practices. To the contrary, FBI policies permit the kind of surveillance Ward rightly criticizes. The FBI's guidelines were changed in 2008 to remove the requirement of any factual predicate before the FBI initiates intrusive investigations, and the FBI has a "racial and ethnic mapping" program targeting racial, ethnic and religious groups all across the country. In Newark, the FBI used census data to identify and map Latino communities throughout New Jersey in an attempt to assess the threat from MS-13. (We're suing in N.J. because the Newark FBI refused to release other documents in response to our Freedom of Information Act request for racial mapping data). In fact, the FBI's modified guidelines allow the same type of abusive surveillance the NYPD engaged in, without any factual predicate, and our nationwide FOIA has revealed FBI agents targeting Muslim communities in Detroit, the Chinese and Russian-American communities in San Francisco, and tracking the growth of the Black population in Georgia. The FBI also used community outreach programs as a guise to collect information about the First Amendment activities of peaceful Muslim groups in Northern California for intelligence and investigative purposes. Also heartening this week were Attorney General Eric Holder comments before the Senate Appropriations Committee characterized the NYPD's behavior as "disturbing" this week while testifying before Congress. We've asked Holder to rein in these abusive racial and ethnic mapping programs and to revise the AGG to require reasonable suspicion before the FBI starts investigations. We've also called on Mayor Bloomberg to investigate the NYPD and for a federal investigation into the use of White House funding in the NYPD's surveillance program. We agree with SAC Michael Ward that suspicionless surveillance is abusive, ineffective and counterproductive, and we appreciate his outspokenness. It's time to put an end to racial, ethnic and religious mapping in all forms, and by all agencies. Managing and analyzing data we have is more important than gathering new data Berman, 11 --- Counsel in the Liberty and National Security Project at the Brennan Center for Justice (Emily, “DOMESTIC INTELLIGENCE: NEW POWERS, NEW RISKS,” http://brennan.3cdn.net/b80aa0bab0b425857d_jdm6b8776.pdf, JMP) The FBI also argues that the Mukasey Guidelines are necessary to remedy the flaws in the FBI’s procedures that contributed to the failure to discover the 9/11 plot. In making this argument at a congressional hearing, FBI Director Mueller cited the now-well-known Phoenix Memo, a memo drafted by an FBI agent in Phoenix, Arizona, warning of risks posed by Middle Eastern men enrolling in flight training school.258 The memo, however, hardly illustrates a lack of information-gathering capacity by the FBI. The memo was unsuccessful in preventing 9/11 not because it contained insufficient information, but because managers at FBI headquarters, the Osama Bin Ladin unit, and the New York field office failed to review or act on it prior to 9/11. Even if the memo had received more attention, there is of course no guarantee that the 9/11 plot would have been derailed. But the very existence of the memo shows that the FBI was entirely capable, even under the Reno-era Guidelines, of collecting the information necessary to safeguard against at least some terrorist attacks. While multiple investigations into the causes of the 9/11 attacks identified flaws in the FBI’s use and handling of intelligence leading up to 9/11,59 none of those flaws was the result of overly restrictive FBI investigative Guidelines. The problem was not an inability to collect necessary information; it was a failure to effectively and efficiently manage, share, or analyze the information already collected. This problem might justify consolidating responsibilities for crime-prevention and intelligence-collection within the FBI, or encouraging increased coordination between the FBI and other government agencies. But it does not justify the expansion of investigative authority contained in the Mukasey Guidelines. AT: DA Terrorism --- Al Qaeda Recruitment Turn Discriminatory targeting policies boosts Al Qaeda recruiting Berman, 11 --- Counsel in the Liberty and National Security Project at the Brennan Center for Justice (Emily, “DOMESTIC INTELLIGENCE: NEW POWERS, NEW RISKS,” http://brennan.3cdn.net/b80aa0bab0b425857d_jdm6b8776.pdf, JMP) In designing Guidelines that allow the FBI to combat the threat of terrorism while protecting our values, it is important to note one additional fact: the United States is not at war with Islam. Indeed, to the contrary. Presidents Obama and George W. Bush both took great pains to disavow any implication that the U.S. struggle was against Islam as such.3 Policymakers past and present,4 scholars,5 national security experts,6 and terrorists7 themselves all recognize that any appearance that the U.S. views Islam as the enemy actually provides Al Qaeda and its allies propaganda that aids recruitment and creates additional risk for our armed forces.8 While a tiny minority of Muslims adopt a perverse version of their faith that encourages violence, the vast majority of American Muslims are law-abiding, patriotic, productive members of society. Any investigative scheme that singles out groups or individuals for government scrutiny based on the assumption that all Muslims in the U.S. are potential terrorists fosters an environment of suspicion and distrust and is likely counterproductive as well. Again, we do not know exactly how these powers are being used or whether they are being abused. Nor do we know what measures, if any, the Justice Department has taken to protect against such abuse. What we do know is this: the Guidelines, on their face, raise new and troubling concerns about possible violations of civil liberties on a wide scale. Ensuring that such abuses do not, in fact, take place requires two types of remedies. First, some of the powers extended to the FBI should be curtailed. In addition to any substantive changes, however, we must ensure that there are meaningful checks on the FBI’s remaining powers—internal checks, such as supervisory approval requirements and regular reviews, as well as external checks, from both Congress and the public. The current Guidelines can be modified relatively easily. A few changes will limit agents’ discretion and increase oversight and accountability mechanisms. This report recommends two types of changes to the existing guidelines. First, procedural mechanisms should be put in place to ensure sufficient oversight of how the Guidelines are used, and whether they are effective. Such mechanisms must exist both within the Justice Department and outside it. For example, Congress should undertake regular reviews of the Guidelines, the ways in which they are being implemented, and their level of effectiveness. Second, some of the most dramatic expansions of FBI power should be scaled back, both to ensure that intrusive investigative methods are used only when there are facts indicating a need for further investigation and to guard against improper consideration of race, religion, ethnicity, national origin, or political ideology in investigative decisions. AT: DA Terrorism --- Lone Wolf Answers Lone wolf threat exaggerated --- being used to justify more counterproductive surveillance ACLU, 15 (2/6/2015, US Official News, “Washington: The Lone-Wolf Terror Trap: Why the Cure Will Be Worse Than the Disease,” Lexis, JMP) American Civil Liberties Union has issued the following news release: The shadow of a new threat seems to be darkening the national security landscape: the lone-wolf terrorist. "The lone wolf is the new nightmare," wrote Washington Post columnist Charles Krauthammer recently, and the conservative pundit wasn't alone in thinking so. "I really see [lone wolves] as being a bigger threat than alQaeda, or the Islamic State, or the al-Qaeda franchises," Scott Stewart, vice president of tactical analysis at the global intelligence and advisory firm Stratfor, told VICE News. Similarly, in the aftermath of the Paris terrorist attacks, appearing on "Meet the Press," Attorney General Eric Holder said, "The thing that I think keeps me up most at night [is] this concern about the lone wolf who goes undetected." You could multiply such statements many times over. There's only one problem with the rising crescendo of alarm about lone wolves: most of it simply isn't true. There's nothing new about the "threat" and the concept is notoriously unreliable, as well as selectively used. (These days, "lone wolf" has largely become a stand-in for "Islamic terrorist," though the category itself is not bound to any specific ideological type.) Worst of all, its recent highlighting paves the way for the heightening of abusive and counterproductive police and national security practices, including the infiltration of minority and activist communities and elaborate sting operations that ensnare the vulnerable. In addition, the categorization of such solitary individuals as terrorists supposedly driven by ideology – left or right, secular or religious -– often obscures multiple other factors that may actually cause them to engage in violence. Like all violent crime, individual terrorism represents a genuine risk, just an exceedingly rare and minimal one. It's not the sort of thing that the government should be able to build whole new, intrusive surveillance programs on or use as an excuse for sending in agents to infiltrate communities. National programs now being set up to combat lone-wolf terrorism have a way of wildly exaggerating its prevalence and dangers – and in the end are only likely to exacerbate the problem. For Americans to concede more of their civil liberties in return for "security" against lone wolves wouldn't be a trade; it would be fraud. Surveillance won’t solve lone-wolf terrorists --- building community trust of law makers is key ACLU, 15 (2/6/2015, US Official News, “Washington: The Lone-Wolf Terror Trap: Why the Cure Will Be Worse Than the Disease,” Lexis, JMP) Anatomy of the Wolf The "literature" on both terrorism and the lone wolf should be approached with a healthy degree of skepticism. To this day, there is little consensus on what exactly terrorism is; the same is true of the lone-wolf variety. In the media and in recent academic studies, what separates the lone-wolf terrorist from the phenomenon in general is the perpetrator. Lone wolves are, by definition, solitary individuals, almost always men, often with mental health problems, who lash out violently against civilian targets. At least in some fashion, they are spurred on by belief. Researcher Michael Becker defines it this way: "Ideologically driven violence, or attempted violence, perpetrated by an individual who plans and executes an attack in the absence of collaboration with other individuals or groups." Although you wouldn't know it at the moment in America, the motivation for such attacks can run the gamut from religiously inspired anti-abortion beliefs to white supremacism, from animal rights to an al-Qaeda-inspired worldview. According to the literature, lone wolves are unique in the annals of terrorism because of the solitariness with which they plan and carry out their acts. They lack peer or group pressure and their crimes are conceived and executed without assistance. In this way, they bear a strong resemblance to the individual school shooters and rampage killers that Americans are already so used to. One practical reason many such individuals act alone, according to researchers, is fear of detection. In "Laws for the Lone Wolf," white supremacist Tom Metzger wrote: "The less any outsider knows, the safer and more successful you will be. Keep your mouth shut and your ears open. Never truly admit to anything." (Before 9/11, lone-wolf terrorism in America was overwhelmingly a right-wing affair.) This isn't to say that individuals who commit political violence don't talk to anyone before they attack. Recent research into 119 lone-actor terrorists in the United States and Europe, who were either convicted of such a crime or died during it, finds that they often expressed their extremist beliefs, grievances, and sometimes their violent intentions to others -- mostly friends and family or online communities. The good news should be that family, friends, and colleagues might be able to help prevent those close to them from engaging in political violence if, as a society, we were to adopt strategies that built trust of law enforcement in the public, particularly affected communities, rather than fear and suspicion. (But given the record these last years, don't hold your breath.) On the other hand, the methods that the police and national security state seem to be exploring to deal with the issue – like trying to determine what kinds of individuals will join terrorist groups or profiling lone wolves – won't work. The reasons individuals join terrorist groups are notoriously complex, and the same holds true for politically violent people who act alone. After reviewing those 119 lone-wolf cases, for example, the researchers concluded, "There was no uniform profile of lone-actor terrorists." Even if a "profile" were to emerge, they added, it would be essentially worthless: "[T]he use of such a profile would be unwarranted because many more people who do not engage in lone-actor terrorism would share these characteristics, while others might not but would still engage in lone-actor terrorism." --- XT: No Impact to Lone Wolf Terrorists There is no impact --- 4 times more likely to die from a lightning strike ACLU, 15 (2/6/2015, US Official News, “Washington: The Lone-Wolf Terror Trap: Why the Cure Will Be Worse Than the Disease,” Lexis, JMP) Fact vs. Fiction Fortunately, what makes lone wolves so difficult to detect beforehand renders them more impotent when they strike. Because such individuals don't have a larger network of financing and training, and may be disturbed as well, they are likely to have a far less sophisticated skill set when it comes to arming themselves or planning attacks. Terrorism researcher Ramon Spaaij of Australia's Victoria University created a database of 88 identified lone wolves who perpetrated attacks between 1968 and 2010 in 15 countries. What he found should dispel some of the fear now being associated with lone-wolf terrorism and so the increasingly elaborate and overzealous government planning around it. Spaaij identified 198 total attacks by those 88 solo actors – just 1.8 percent of the 11,235 recorded terrorist incidents worldwide. Since lone wolves generally don't have the know-how to construct bombs (as the Unabomber did), they usually rely on firearms and attack soft, populated targets, which law enforcement responds to quickly. Therefore, Spaaij found that the average lethality rate was .062 deaths per attack while group-based terrorists averaged 1.6 people per attack Inside the United States, 136 people died due to individual terrorist attacks between 1940 and 2012 – each death undoubtedly a tragedy, but still a microscopic total compared to the 14,000 murders the FBI has reported in each of the last five years. In other words, you shouldn't be losing sleep over lone-wolf attacks. As an American, the chance that you'll die in any kind of terrorist violence is infinitesimal to begin with. In fact, you're four more times likely to die from being struck by lightning. If anything, the present elevation of the lone-wolf terrorist to existential threat status in Washington creates the kind of fear and government overreach that the perpetrators of such attacks want to provoke. If individual terrorists are the "new nightmare," it's only because we allow them to be. --- XT: Link Turn Many cases of lone wolf terrorism result from law enforcement instigated plots and aren’t linked to Muslim identity ACLU, 15 (2/6/2015, US Official News, “Washington: The Lone-Wolf Terror Trap: Why the Cure Will Be Worse Than the Disease,” Lexis, JMP) Lone Wolf ≠ Muslim During the December hostage crisis at a café in Sydney, Australia, orchestrated by Man Haron Monis, an Iranian immigrant, former CIA Deputy Director Michael Morell had this dire prediction: "[W]e're going to see this kind of attack here," he told "CBS This Morning." "It shouldn't surprise people when this happens here sometime over the next year or so, guaranteed." This was typical of the recent rhetorical escalation by officials and former officials in the national security state when it comes to this kind of terror. But Morell's prediction was no prediction at all. Such attacks do occur here. One had, for instance, been solved a little more than a month earlier. Eric Matthew Frein was apprehended the day before Halloween through an intensive search in the Pocono mountains of Pennsylvania after shooting two state troopers outside a police barracks with a sniper rifle in September. Officer Corporal Bryon K. Dickson II died, while Trooper Alex T. Douglass was wounded. Frein, whom authorities initially called an "anti-government survivalist," was eventually charged with two terrorism counts after he told police that the shootings were a way to "wake people up." They also found a letter he had written to his parents stating that he wanted to "ignite a fire" because only "another revolution can get us back the liberties we once had." Individual violence like this, whether labeled as terrorism or not, is nothing new. It's been dealt with for decades without the kind of panic, fear-mongering, and measures being instituted today. After all, according to Spaaij, between 1968 and 2010, 45 percent of all individual terrorist attacks recorded in 15 countries occurred in the United States. However, as Spaaij and his research partner Mark Hamm discovered, these figures are distinctly bloated. The reason is simple: included in them are numerous examples of "individual" terrorist acts inspired by al-Qaedastyle ideology that actually resulted from law enforcement-instigated or -aided plots. Spaaij and Hamm found that at least 15 of these had occurred between 2001 and 2013. In them, a "lone" perpetrator would actually be involved with, and often directed or encouraged by, a government informant or undercover agent. This adds up to about 25 percent of post-9/11 cases of lone wolfism in the U.S., though the label is hardly accurate under the circumstances. These are essentially government stings, which not only inflate the number of individual terrorism incidents in the U.S., but disproportionately focus law enforcement attention on American Muslim communities. An egregious example was the case of Rezwan Ferdaus, a 26-year-old Massachusetts man and American Muslim. The FBI busted him in 2011 for conspiring with undercover agents to build crude explosive-laden drones out of remote-controlled planes to fly into the Pentagon and the Capitol Building. In reality, this was a government-concocted plot, and Ferdaus was no lone wolf. (He was incapable of thinking this up or carrying it off on his own.) The FBI ignored clear signs that their target wasn't a terrorist, but a mentally ill man, deteriorating rapidly. Nevertheless, he was repeatedly termed a lone wolf by law enforcement and the media. Charged with providing material support to terrorists, in 2012, he was sentenced to 17 years in prison. By contrast, when the apparent lone wolf isn't a Muslim or other minority, he rarely finds the fear-inducing terrorist label pinned on him by the government, the media, or security experts. Take James von Brunn, a white supremacist who murdered a security guard at the United States Holocaust Memorial Museum. According to the Department of Homeland Security, the act had no connection to terrorism, although it was ideologically motivated, as one FBI official acknowledged. Or Francis Grady, who tried to burn down a Planned Parenthood clinic in Grand Chute, Wisconsin, in 2012, because, as he told a U.S. district court judge, "They're killing babies there." Grady was not charged with a terrorism offence either. When asked why, Assistant United States Attorney William Roach said that Grady had tried to burn down an unoccupied room in an empty building. Compare those reactions to the case of Zale Thompson, a disturbed African-American man who attacked four New York City police officers in October with a hatchet. Only a day after the attack, Police Commissioner Bill Bratton said, "I'm very comfortable this was a terrorist attack, certainly." The apparent evidence: Thompson was a recent convert to Islam who had visited websites affiliated with terrorist groups like al-Qaeda and ISIS. As Glenn Greenwald has pointed out, "Terrorism is simultaneously the single most meaningless and manipulated word in the American political lexicon." The same can be said of its lone-wolf version. Not surprisingly, it has by now become essentially synonymous with being Muslim and little else, which stigmatizes American Muslims and makes their communities targets for abusive law enforcement techniques, including FBI-style sting operations and massive, intrusive surveillance. Typically, one terrorism researcher defined lone wolves as "individuals pursuing Islamist terrorist goals alone." In reality, Muslims have no more of a monopoly on lone-wolf terrorism than they do on terrorism more generally. AT: DA Terrorism --- Impact Doesn’t Outweigh ***note when prepping file --- this ev is contained at the bottom of a longer Fisher, 4 card in the “XT: Terrorism Internal Link” block Risk of terrorism doesn’t outweigh or justify abrogation of rights form surveillance Fisher, 4 --- Associate Professor of Law and Director, Center for Social Justice, Seton Hall Law School (Winter 2004, Linda E., Arizona Law Review, “Guilt by Expressive Association: Political Profiling, Surveillance and the Privacy of Groups,” 46 Ariz. L. Rev. 621, Lexis, JMP) [*660] Nonetheless, some contend that any correlation, even the slightest one, between the profiled characteristic and crime can justify use of a profiling practice when the potential danger is severe. Terrorism certainly would fall within that category. Might not the extreme danger posed by terrorism, combined with the possibility that Muslims with radical beliefs are more likely to be terrorists than the remainder of the population, justify political profiling in certain circumstances? My response, is that this justification for surveillance is generally insufficient, though a terrorist emergency involving a serious threat of imminent violence could justify a preliminary inquiry on less than an individualized reasonable suspicion of crime. n218 The threat presented by international terrorism is not more dangerous than other threats faced by the U. S. in the twentieth century. On the contrary, it is substantially less dangerous than the Cold War's nuclear standoff, which threatened the immediate destruction of not only the United States but also the entire world. It is not sufficiently qualitatively distinct from past threats to justify abrogation of basic civil liberties. Past civil liberties violations such as the Palmer Raids, the excesses of the McCarthy era, the injustice of the internment of Japanese-Americans during World War II, or the abuses of surveillance in the 1960's did little to increase national security The nature of the current domestic threat does not justify complete deference to the executive branch with respect to the associational rights of those within the U.S. Although courts often defer to the political branches in cases where national security is at stake, that deference is not absolute and is "subject to important constitutional limits." n219 In particular, courts hesitate to defer where constitutional rights are heavily implicated, n220 as they undeniably are in the case of [*661] political or religious surveillance. Although courts lack expertise in adjudicating questions concerning the national defense, reasonable restrictions on domestic political surveillance will not hamper the necessary defense of our national security. AT: Politics DA Congressional opposition growing to suspicionless surveillance Chaffee, 12 --- Legislative Policy Counsel, ACLU Washington Legislative Office (6/7/2012, Devon, “Members of Congress Urge Investigation of FBI Muslim Surveillance,” https://www.aclu.org/blog/members-congress-urge-investigation-fbi-muslim-surveillance, JMP) Yesterday 22 Members of Congress sent a letter to the Inspector General of the Department of Justice urging him to launch an investigation into the Federal Bureau of Investigation's improper recording and dissemination of information about the First Amendment-protected activities of American Muslims. Several of the members who joined the letter-including Representatives Pete Stark (D-CA-13), Anna Eshoo (D-CA14), Sam Farr (D- CA-17), Mike Honda (D- CA-15), Zoe Lofgren (D-CA-16), and Barbara Lee (D-CA-09) represent districts in Northern California in which FBI memoranda document the use of community outreach for intelligence purposes. The joint letter rightly highlights the negative impacts of the FBI’s misuse of community and mosque outreach to gather intelligence about Americans. The letter states: Any FBI practice of taking information collected during community outreach efforts for the purpose of utilizing it as intelligence threatens to erode crucial trust between federal law enforcement and American communities. It is also contrary to basic constitutional principles of free speech and freedom of religion. In April, the ACLU sent its own letter to the Inspector General following the release of FBI documents obtained through FOIA litigation, which demonstrate that from at least 2004 through 2010, the San Francisco and Sacramento FBI field offices documented and disseminated records on American Muslims' exercise of their First Amendment rights. Recorded activities include: the content of a religious sermon; the content of identified speakers' speeches at community events; and individuals' religious affiliations and associations. The FBI's retention of such information in its intelligence files-almost all of the documents were classified as secret or marked as positive intelligence, and were labeled for distribution outside of the FBIviolates federal Privacy Act prohibitions against the maintenance of records about individuals' First Amendment-protected activity. Bipartisan opposition to overbroad surveillance Sulmasy, 13 --- Professor of Law and Governmental Affairs Officer at Coast Guard Academy (6/10/2013, Glenn, “Why we need government surveillance,” http://www.cnn.com/2013/06/10/opinion/sulmasy-nsasnowden/, JMP) The uproar over the recent revelations about government surveillance programs has raised eyebrows and concerns across the political spectrum. Many on the left have been surprised that most of the same policies (now even the surveillance of U.S. citizens and phone companies) that President George W. Bush initiated, are being used, and expanded upon, by the Obama administration. Many on the right say it is government overreach and that Congress should have been briefed on the broad programs. Although the cause for alarm in political or policy circles might have merit, the exercise of these authorities by the executive branch does, in fact, appear to be legal. Once again, the war on al Qaeda is pitting national security against America's longstanding commitment to the promotion of civil liberties and human rights. Plan doesn’t require congressional legislation Berman, 14 --- Visiting Assistant Professor of Law, Brooklyn Law School (Winter 2014, Emily, Washington & Lee Law Review, “Regulating Domestic Intelligence Collection,” 71 Wash & Lee L. Rev. 3, Lexis, JMP) Congress Reclaims Authority. One option, of course, is for Congress simply to relieve an agency of responsibility for one of [*68] the competing goals, reclaiming that decision-making authority for itself. n259 Following revelations of civil liberties violations in the 1970s, Congress reclaimed some decision-making authority regarding the executive's surveillance powers by enacting the Foreign Intelligence Surveillance Act (FISA). n260 Or Congress could generate more piecemeal limitations, barring particular techniques that pose threats to civil liberties, or defining the circumstances under which such techniques could be used. Congress could, for example, statutorily reinstate the rule regarding the use of undercover agents to investigate First Amendment protected activities as it existed in the Guidelines in 2001, which required that the FBI have probable cause or a reason to believe a crime had been committed before sending an agent into the meetings of a religious or political group. n261 Congress need not legislate to bring such changes about. If Congress wanted to alter particular investigative tactics, or even to pressure the Justice Department to adopt of its own volition the type of procedural framework suggested in this Article, it has an array of tools at its disposal to press for its desired policy change. Just the threat of legislation, so long as it is credible, can spur executive action. Recall that the original Attorney General's Guidelines were implemented to sap the momentum from Congress's efforts to enact a legislative charter for the FBI. n262 So long as the option of enacting an FBI charter remains a viable means for Congress to limit the Attorney General's discretion when it comes to FBI investigations, the threat of such legislation can be used to press for Congress's desired policy outcomes. Congress possesses carrots as well as sticks--its control over the FBI and Justice Department's budget also can impose a great [*69] deal of pressure for policy change. Given the political economy of this policy area, n263 however, reliance on Congress to reconcile the tension between the FBI's security mission and civil liberties is not the most promising route. AT: CP Administrative Law --- External Checks Necessary ***note when prepping file --- the evidence in “External Checks Solvency” are also useful to answer this counterplan Only clearly enforced limits on the FBI solve --- flexibility is just a cover for abuses Berman, 11 --- Counsel in the Liberty and National Security Project at the Brennan Center for Justice (Emily, “DOMESTIC INTELLIGENCE: NEW POWERS, NEW RISKS,” http://brennan.3cdn.net/b80aa0bab0b425857d_jdm6b8776.pdf, JMP) Each of the following examples of law enforcement investigative activity shares two characteristics. First, each provides an example of problems posed when law enforcement agents conduct their operations in the absence of clear—sufficiently regulated and enforced—limits on investigative activity. Second, none yielded any evidence of terrorist activity or threats to America’s security. Consider the following: • From 2003 to 2007, in violation of law and FBI policy, the FBI misused so-called “exigent letters”— informal requests for information that may be used in lieu of formal subpoenas in limited, emergency situations—and other forms of informal information requests to obtain thousands of phone records that were not connected with terrorism emergencies.9 According to the Justice Department’s Inspector General, the unlawful practices, which included the acquisition of the phone records of reporters,10 were widespread, systemic, and the result of significant management failures.11 The result was what the Inspector General called an “egregious breakdown” of the FBI’s responsibility to comply with privacy laws and internal policies.12 • In 2009, the North Central Texas Fusion System,13 a joint enterprise by FBI and local law enforcement, made public a “Prevention Awareness Bulletin.” The Bulletin informed recipients that it was “imperative for law enforcement offices to report” the activities of lobbying groups, Muslim civil rights organizations, and anti-war groups in their areas.14 • In 2007, in Orange County, California, the Council on American-Islamic Relations reported a suspected terrorist to the FBI. The “suspect” had been barred from a mosque for promoting terrorist plots and attempting to recruit others. It later emerged that the agitator was an FBI informant paid to infiltrate area mosques—despite the fact that the FBI had assured Muslim community leaders that it was not monitoring their places of worship.15 • Documents disclosed through Freedom of Information Act (FOIA) requests and confirmed by an Inspector General report indicate that the members and activities of several religious and political organizations—including Greenpeace, the Global Network Against Weapons and Nuclear Power in Space, and the Catholic Workers’ Union—have been subjects of FBI surveillance.16 These same documents show that the FBI has collected information regarding the Thomas Merton Center, an organization committed to “nonviolent struggle to bring about a more peaceful world,” and its anti-war protests.17 • From 2001 to 2006, in the course of investigations into anti-war groups, environmental activists, and animal-rights activists, the FBI conducted investigations with insufficient factual predicate, failed to document properly the basis for investigations, improperly extended the duration of investigations, and considered as “domestic terrorism cases” investigations into potential crimes—such as trespassing and vandalism—that are not commonly considered terrorism, raising “questions about whether the FBI has expanded the definition of domestic terrorism to people who engage in mainstream political activity, including nonviolent protest and civil disobedience.”18 The concerns raised by these examples—risk of government overreaching to acquire information that may or may not be useful—are always present, but they are particularly stark when investigations lack concrete focus. When government officials operate with increased discretion, individual liberties, particularly privacy rights and First Amendment rights to speak and to gather, often suffer. At the same time, the risk increases that law enforcement agents will rely on inappropriate criteria—race, religion, national origin, ethnicity or political leanings—as the basis for investigation. In short, the greater the official discretion, the greater the potential for abuse. FBI internal action buys off statutory action and is easily susceptible to back sliding Berman, 11 --- Counsel in the Liberty and National Security Project at the Brennan Center for Justice (Emily, “DOMESTIC INTELLIGENCE: NEW POWERS, NEW RISKS,” http://brennan.3cdn.net/b80aa0bab0b425857d_jdm6b8776.pdf, JMP) 3. The Erosion of the Guidelines’ Protections: 1980-2008 Since their inception, the Guidelines have functioned as the primary constraint on the FBI’s operations, and they remain a justification for the lack of a statutory charter governing the FBI’s activities.69 Initially implemented in response to the perceived abuses by the FBI in the context of domestic intelligence collection, they represented an effort to reject the pre-guidelines practice of broad intelligence-collection activities unrelated to crimes or threats and instead to treat domestic threats as a facet of criminal law enforcement.70 The purpose of the original Guidelines was thus to constrain the FBI’s intelligence-collection role within acceptable bounds, to prevent it from interfering unduly in the lives of law-abiding groups or individuals, and to tether the FBI’s activities to the detection and prevention of crime. Attorney General Civiletti in 1980 issued new Guidelines, which incorporated the 1976 Levi Guidelines and added to them rules for investigating general crimes and racketeering enterprises.71 In 1983, Attorney General William French Smith again altered the structure of the Guidelines,72 expanding the concept of domestic security investigations—labeling them “criminal intelligence investigations”—to include both terrorism investigations and racketeering enterprise investigations.73 The 1983 Smith Guidelines thus governed on the one hand “general crimes investigations” and on the other “criminal intelligence investigations,” which included both racketeering and domestic security/terrorism. And the FCI Guidelines, known by this time as the Foreign Intelligence Collection and Foreign Counterintelligence Investigation (FI/FCI) Guidelines, governed the FBI’s collection of foreign intelligence and counterintelligence operations. So the full spectrum of the FBI’s domestic activities was subject to the limits of various guidelines.74 These limits on FBI authority did not preclude all possibility of misplaced domestic intelligence efforts. For example, a 1980s investigation into the Committee in Solidarity with the People of El Salvador (CISPES), an activist organization that opposed Reagan-era policies toward El Salvador, became an exercise in mapping the activities of a community engaged in lawful dissent.75 The result was a broad investigation into the activity and membership of groups opposed to U.S. policy in El Salvador that produced “no reliable information of planned violence or other illegal activity.”76 And the Cold-War-era Library Awareness Program included regular FBI visits to public libraries seeking information regarding individuals who read scientific and technical journals, sometimes asking “librarians to be wary of ‘foreigners’ or persons with ‘East European or Russian-sounding names.’”77 These examples illustrate that even under a guidelines regime, meaningful limits, procedural safeguards, and effective oversight remain necessary to keep investigations from wandering too far afield and interfering with the activities of law-abiding individuals and groups. But over time, and especially in the wake of perceived domestic intelligence and crime prevention failures, the lessons of history seem to have faded. Successive sets of guidelines, while expanding the breadth of their coverage, have loosened restrictions on FBI operations. The commendable desire to prevent domestic threats, rather than merely to respond to them, has led to the expansion of the FBI’s domesticintelligence-collection and analysis role—a development that calls for increased vigilance against abuse, not the opposite. At the same time, the standard that must be met before the FBI can engage in investigative activity has become less and less stringent; both obligatory and discretionary limits on the intrusiveness of investigative techniques have been rolled back; and oversight and approval requirements have been relaxed. Clearly defined limits on FBI criminal intelligence investigations key to prevent abuses Berman, 11 --- Counsel in the Liberty and National Security Project at the Brennan Center for Justice (Emily, “DOMESTIC INTELLIGENCE: NEW POWERS, NEW RISKS,” http://brennan.3cdn.net/b80aa0bab0b425857d_jdm6b8776.pdf, JMP) The most familiar type of FBI investigation is one aimed at traditional law enforcement, known today as a “general crimes investigation.” These usually begin after and in response to the commission of a particular criminal act. They are meant to determine “who committed that act and…secur[e] evidence to establish the elements of the particular offense.”20 The object of the investigation is clearly defined. Its scope is limited. Its focus extends only to evidence relevant to elements of the particular crime. And the investigation ends when the crime is solved. A second type of investigation is one that collects intelligence in order to deter the commission of future criminal acts. Intelligence investigations may consist of domestic investigations into criminal enterprises, such as organized crime syndicates or terrorist organizations, known as “criminal intelligence investigations.” Or they may aim to collect foreign intelligence, which is defined as “information relating to the capabilities, intentions, or activities of foreign governments or elements thereof, foreign organizations or foreign persons, or international terrorists.”21 Criminal intelligence investigations are open-ended by nature and last longer than general crimes investigations. “[T]here may be no completed offense to provide a framework for the investigation. …[T]he investigation is broader and less discriminate,”22 collecting information on the “size and composition of the group involved, its geographic dimensions, its past acts and intended criminal goals, and its capacity for harm.”23 Foreign intelligence investigations share many of these characteristics as well. As the Justice Department recognizes, the open-ended nature of intelligence investigations coupled with their attenuated connection to specific crimes poses particular risks. In the absence of clearly defined limits on an investigation and its scope, purpose, or duration, it is likely that agents will collect much information about law-abiding Americans. And an investigation of organizational activity “may present special problems particularly where it deals with politically motivated acts. … [S]pecial care must be exercised in sorting out protected activities from those which may lead to violence or serious disruption of society.”24 Thus, while the FBI has conducted investigations for both law enforcement and intelligence purposes throughout its history, it is the intelligence-collection activities that occasion the most frequent calls for reform. Debate over the proper role of the FBI—whether it is primarily a crime-solving entity, a domestic-intelligence agency, or some mixture of the two—has not yet yielded a definitive answer. Indeed, the FBI’s statutory mandate remains remarkably vague. There is no legislative charter defining the FBI’s purpose or setting out the scope of its authority.25 Congress’s hands-off approach to the Bureau’s role leaves the Department of Justice (“DOJ”), the Attorney General, the Director of National Intelligence, and the FBI Director with enormous discretion to determine the Bureau’s goals and how it will pursue them. Some of the methods the FBI employs, such as seizing items from inside a suspect’s home and monitoring electronic communications, are subject to constitutional and statutory constraints.26 But the FBI has a host of investigative tools at its disposal that are effectively unregulated. At times the FBI has exploited this regulatory void, going so far as to attack anonymously the political beliefs of targets to induce their employers to fire them; to mail letters anonymously to spouses of intelligence targets in order to destroy their marriages; or to disseminate misinformation in order to disrupt demonstrations and encourage violence.27 As discussed below, the use of many of these tactics led to the promulgation of the first set of Attorney General’s Guidelines in 1976. Though some of the most troubling tactics are impermissible under the current Guidelines, many tactics authorized by the current Guidelines involve significant intrusion into the private lives of Americans. These include permitting FBI agents (or informants acting under FBI instructions) to spy on worship services or political gatherings; to question family, friends, neighbors, and coworkers of an investigative target without revealing that they are FBI agents; to engage in 24-hour physical surveillance of targets; and to monitor the addresses to which targets send letters and the phone numbers that they call. Given the significant intrusion these and other permissible techniques allow, it is vital to have rules in place to ensure that the uses to which these techniques are put are appropriate. AT: PICs Maintaining even limited federal surveillance condones discrimination --- it is a simple “yes / no” question Horwitz, 14 --- covers the Justice Department and criminal justice issues nationwide for The Washington Post (12/8/2014, Sari, “Justice Dept. announces new rules to curb racial profiling by federal law enforcement,” http://www.washingtonpost.com/world/national-security/justice-dept-to-announce-newrules-to-curb-racial-profiling-by-federal-law-enforcement/2014/12/07/e00eca18-7e79-11e4-9f3895a187e4c1f7_story.html, JMP) The Obama administration on Monday formally announced long-awaited curbs on racial profiling by federal law enforcement, but the new rules will not cover local police departments, which have come under criticism in recent months over allegations that their officers profile suspects. Attorney General Eric H. Holder Jr. expanded Justice Department rules for racial profiling to prevent FBI agents from considering gender, national origin, religion, sexual orientation and gender identity, in addition to race and ethnicity, when opening cases. The department also is banning racial profiling from national security cases for the first time. Holder’s revised policy covers state and local law enforcement officers while they participate in federal law enforcement task forces. But it is considered only guidance for police officers in state and local departments. The profiling rules come at a time of racial tension around the country after the recent deaths of three African Americans at the hands of police in Ferguson, Mo., New York and Cleveland, and the absence of criminal charges against the white police officers who were involved. “As attorney general, I have repeatedly made clear that profiling by law enforcement is not only wrong, it is profoundly misguided and ineffective,” Holder said. “Particularly in light of certain recent incidents we’ve seen at the local level, and the widespread concerns about trust in the criminal justice process, it’s imperative that we take every possible action to institute strong and sound policing practices.” A Justice Department official said the goal is for federal law enforcement agencies to “model” these policies, proving to state and local authorities that successful policing does not require profiling. Holder held a conference call Monday with local law enforcement leaders to brief them on the policy and encourage them to adopt it. “At this historic moment in our nation’s race relations, the release of this revised guidance is an important signal of progress, but it does not completely address the need for reform of policing tactics at the state and local level,” said Laura W. Murphy, director of the American Civil Liberties Union’s Washington legislative office. The rules also apply for the first time to many activities at the Department of Homeland Security, including all Immigration and Customs Enforcement civil immigration enforcement, U.S. Coast Guard law enforcement activities, Border Patrol activities not near the border, DHS officers protecting government buildings and federal air marshals. But DHS officials will not be covered by the new racial profiling ban when they screen airline passengers and guard the country’s Southwestern border. Customs and Border Protection, for example, still will be allowed to use profiling when conducting screenings and inspections at the country’s ports of entry and interdictions of travelers at the border, government officials said. Secret Service protective activities also will not be covered by the rules. “Having a particular skin color, religious belief or last name is not a crime,” said Rajdeep Singh, director of law and policy at the Sikh Coalition, the largest Sikh American civil liberties organization. “This is not a 50-50 issue. The Obama administration can either ban profiling or allow it. It sounds like they’re committed to allowing it.” A fact sheet on the policy said that some DHS activity is not covered by the policy because of the “unique nature of DHS’s mission.” “This does not mean that officers and agents are free to profile,” according to the DHS fact sheet. “To the contrary, DHS’s existing policies make it categorically clear that profiling is prohibited, while articulating limited circumstances where it is permissible to rely in part on these characteristics, because of the unique nature of border and transportation security as compared to traditional law enforcement.” President George W. Bush banned racial profiling in 2003, but the prohibition did not apply to national security investigations and covered only race — not religion, national origin, gender or sexual orientation and gender identity. Civil rights groups and Democratic lawmakers have pushed for expanded anti-profiling protections since President Obama was elected in 2008. Holder began the process to revamp the rules in 2009 and considers the new policy one of the signature accomplishments of his tenure. About six months ago, the Justice Department delivered the rules to the White House. But they applied only to the department, and White House officials wanted the polices to cover additional agencies. The rules have been delayed in part because DHS officials pushed the White House and the Justice Department to allow major exclusions for agencies such as the Transportation Security Administration, Immigration and Customs Enforcement, and Customs and Border Protection. In several high-level meetings, DHS Secretary Jeh Johnson argued that immigration and customs agents and airport screeners needed to consider a variety of factors to keep the nation safe, according to officials familiar with his personal efforts. TSA officials argued that the rules should not apply to them because the TSA is not a law enforcement agency. In its fact sheet, DHS officials said that they will review activities not directly covered by the guidance to ensure that “we are including every appropriate safeguard and civil rights protection in the execution of those important security activities, and to enhance our policies where necessary.” But that was not enough assurance for civil liberties advocates. “It’s baffling that even as the government recognizes that bias-based policing is patently unacceptable, it gives a green light for the FBI, TSA and CBP to profile racial, religious and other minorities,” the ACLU’s Murphy said. “This guidance is not an adequate response to the crisis of racial profiling in America.” Explicit carve-outs that green light surveillance by federal agencies based on race, religion and ethnicity don’t solve the case ACLU, 14 (12/8/2014, “ACLU Response to Revised DOJ Guidance on the Use of Race by Federal Law Enforcement Agencies,” https://www.aclu.org/news/aclu-response-revised-doj-guidance-use-race-federallaw-enforcement-agencies?redirect=criminal-law-reform-racial-justice/aclu-response-revised-doj-guidanceuse-race-federal-law-enforceme, JMP) WASHINGTON— The U.S. Department of Justice released a revised version of its Guidance Regarding the Use of Race by Federal Law Enforcement Agencies, today. The initial Justice Department guidance was issued in 2003 by Attorney General John Ashcroft. The Ashcroft Guidance banned racial profiling, but contained gaping loopholes that gave federal law enforcement express permission to discriminate. According to the White House and Justice Department, the revised Guidance will eliminate some of the existing carve-outs for law enforcement activities related to "protecting national security or the integrity of the borders." It will prohibit profiling based on national origin, religion, gender, sexual orientation, and gender identity, in addition to race and ethnicity. It also will apply to state and local law enforcement agencies participating in federal law enforcement task forces. The Guidance does not eliminate carve-outs permitting discrimination at the border by Transportation Security Administration (TSA) and both at and in the "vicinity" of the border by U.S. Customs and Border Protection (CBP), nor does it fully bar biased profiling in the national security context. The following response to the official revised Guidance can be attributed to ACLU Washington Legislative Office Director Laura W. Murphy: At this historic moment in our nation's race relations, the release of this revised Guidance is an important signal of progress, but it does not completely address the need for reform of policing tactics at the state and local level. The inclusion of new categories such as national origin, religion, sexual orientation and gender identity; establishment of much-needed data collection and training, and coverage of some state and local law enforcement activities are elements of the Guidance we should celebrate. However, several components of the Guidance do little to nothing to protect some minority populations that have to endure unfair targeting by law enforcement every day. Using race, the color of someone's skin, religion, or ethnicity as any basis for suspicion or investigation is demoralizing, unconstitutional, and a practice that should be left in the history books, where it belongs. It's baffling that even as the government recognizes that bias-based policing is patently unacceptable, it gives a green light for the FBI, TSA, and CBP to profile racial, religious and other minorities at or in the vicinity of the border and in certain national security contexts, and does not apply the Guidance to most state and local law enforcement. While the Guidance purports to close the national security loophole, it's so loosely drafted that its exceptions risk swallowing any rule and permit some of the worst law enforcement policies and practices that have victimized and alienated American Muslim and other minority communities. This Guidance is not an adequate response to the crisis of racial profiling in America. The President should compel all his federal police, as well as state and local agencies to adhere to the law and stop engaging in biased profiling now. AT: Kritiks --- Surveillance Undermines Social Movements Government surveillance undermines the transformative potential of social movements necessary for a full-functioning democracy Burkhart, et. al, 7 (2007, Laurie Burkhart, Michael Haubert, and Damon Thorley, “The Efect of Government Surveillance on Social Progress,” in Confronting Information Ethics in the New Millennium, http://www.ethicapublishing.com/5CH1.htm, JMP) “Once a government is committed to the principle of silencing the voice of opposition, it has only one way to go, and that is down the path of increasingly repressive measures, until it becomes a source of terror to all its citizens and creates a country where everyone lives in fear. ” -- Harry Truman1 Introduction Intensive surveillance by government agencies can effectively stop (or hinder) the chance of social and political change. The status quo has been set and history has shown near-perfect success of infiltration and destruction of political and social movements by a number of surveillance tactics and programs. United States history demonstrates the positive social effects that certain radical political groups have caused despite government intrusion. With increasing technology and access to information, the government has and continues to more effectively monitor radical political and social groups while discouraging and halting free political participation of its citizens as a result of the “chilling effect”. Without free political participation social change becomes impossible. In order for a democracy to move forward it needs free ideology and radical movements to challenge the system and force social change. Not only does extensive government surveillance discourage political participation through the “chilling effect” – it also presents ethical violations. Under the ethical frameworks of duty-based, utilitarian, and rightsbased theories, the conduct of government surveillance of the past and present is unethical. From duty and rights-based theories government surveillance practices violate legal and social regulations of American society. Under utilitarian theory, government surveillance takes away the ability to change and progress what the citizens believe to be the greatest good for society. Surveillance creates a chilling effect that dissuades people from meaningfully participating in social and political movements --- the plan is a good idea in all ethical frameworks Burkhart, et. al, 7 (2007, Laurie Burkhart, Michael Haubert, and Damon Thorley, “The Efect of Government Surveillance on Social Progress,” in Confronting Information Ethics in the New Millennium, http://www.ethicapublishing.com/5CH1.htm, JMP) The Chilling Effect In United States law, the “chilling effect” refers to the stifling effect that vague or overbroad laws may have on legitimate speech and activity typically protected by the First Amendment.1 Theoretically, the “chilling effect” has a dramatic repercussion on citizens’ willingness to freely express their beliefs and opinions. In past U.S. history the “chilling effect” has been used in court cases as evidence against certain government surveillance tactics. In the Supreme Court case Socialist Workers Party v. Attorney General of U.S., the “chilling effect” was used as a basis for getting a preliminary injunction brought against the FBI. “The applicants argue that a stay is necessary to protect the First Amendment speech and association rights of those planning to attend the YSA convention. Surveillance and other forms of monitoring, they claim, will chill free participation and debate, and may even discourage some from attending the convention altogether. Beyond this, the applicants allege that the FBI has admitted that its agents or informants intend to participate in the convention debate posing as bona fide YSA members.2 This 'double agent' activity, the applicants claim, will result in the “corruption of the democratic process” and consequent irreparable harm to the applicants and others who would participate in the convention.<sup>1</sup>” Although the effect of FBI surveillance and participation in Communist party activities was apparent, the Supreme Court ruled in favor of the FBI. “In weighing the nature of the planned investigative activity, the justification for that activity, and the claimed First Amendment infringement in this case, the Court of Appeals determined that the balance of the equities tipped in favor of the Government and that a preliminary injunction was therefore improper.3” This case demonstrates an example of the “chilling effect” as a result of FBI surveillance, while also showing these tactics and related effects on free speech being condoned by the U.S. government. In recent years the “chilling effect” has taken on a much larger role in American society, not only through increased government surveillance deterring political participation, but through a broad range of social functions as well. Simple examples will show that social internet networks such as MySpace.com and The Facebook are having detrimental effects to people’s willingness to present information about themselves or their views. Some users of these networks have lost jobs or have been forced to censor what they publish in fear of what ramifications it may have on their job status or future wellbeing. In January, an undisclosed number of student-athletes were dismissed from the University of Colorado track team after posting indecent pictures of themselves on Facebook.4 The enormous amount of voluntary and involuntary personal information that can be tracked and monitored in today’s information age is causing people to give into the “chilling effect” in both political and social arenas. In all aspects of life, citizens of the U.S. are trying to fit the surveillance system rather than try to change or influence it. Once the people give into the system and refuse to participate or rebel out of fear of self incrimination then all hope of social progress is lost. Current Climate in the U.S. The government has the ultimate responsibility of procuring the safety of its citizens and upholding the values this country was founded upon. The argument we intend to layout is that while the government is concerned with the cease of any social and political change in opposition to its current agenda, this also inhibits the chance of further positive social and political climate change. Through certain tactics and surveillance, our government has the power to halt any social change while it is still in the ideological phase. The following points are composed of recent and post-9/1 1 incidents and programs the Bush administration has partaken in: Recently, the FBI admitted to surveilling mosques in nine cities nationwide, along with acknowledgement of keeping certain individuals of Muslim-descent (in the U.S.) under extreme surveillance. Agents have defended the programs, claiming certain mosques have provided them with lists of members5; The government is currently seeking to revamp its entire surveillance initiative, revising the process of getting warrants from the secretive Foreign National Surveillance Act (FISA) court to investigate suspected terrorists, spies, and other national security threats. The administration also wants new provisions in place to ease surveillance of people suspected of spreading weapons of mass destruction internationally. Among other tools available now: the government can break into homes, hotel rooms and cars to install hidden cameras and devices, as well as search drawers, luggage, or computer hard drives6; It has been revealed that the FBI used ‘national-security letters’ to scrutinize the financial and travel data, as well as telephone logs of thousands of U.S. citizens and residents. In March, a U.S. Justice Department report detailed the “widespread and serious misuse” of these letters since the inception of the Patriot Act. Between 2003 and 2005, the FBI issued more than 140,000 national-security letters, many of which involved people with no obvious ties to terrorism7; In 2006, it was revealed that President Bush signed a secret order in 2002 which authorized the National Security Agency (NSA) to eavesdrop on U.S. citizens and foreign nationals within the United States – despite past legal prohibitions against similar domestic spying. The NSA has monitored the e-mail, phones, and other communications of thousands of individuals without warrants8; In 2004, the Justice Department subpoenaed records from colleges and universities around the country relating to peaceful on-campus meetings between local anti-war activists and scholars5; In 2004, a University of Arizona sophomore was forbidden to attend a Social Security forum with President Bush due to a t-shirt that read, “Don’t be a smart [image of a donkey, the Democratic Party symbol]. UA Democrats.” The young man returned to the event with a different shirt yet was still refused entry as he had been placed on a list of people banned from the event and labeled as a “potential risk9”; In 2003, the New York City Police Department questioned multiple arrestees who had been detained at anti-war demonstrations. Various types of information were stored in a government database; Also in 2003, media reports surfaced accusing the FBI of collecting extensive information on the anti-war movement in search of “extremists”; Chicago Police infiltrated five protest groups in early 2002. Information pertaining to the case has been limited, along with that regarding the known surveillance tactics which were used5. Hunting down and weeding out individuals who disagree with the current administrative policy has become familiar practice. In an issue closer to home, Colorado GOP staffers ejected three people from a taxpayerfunded town hall meeting in 2005 that George W. Bush was attending in Denver, under the belief that they may be protesting. The three individuals were thrown out for behaving suspiciously while at their vehicle, which had a bumper sticker stating, “No More Blood For Oil.” The White House has refused to comment on the situation due to pending investigations. Two of the individuals who were thrown out, Leslie Weise and Alex Young, have filed a federal lawsuit against the GOP committee because they claim they were told to leave “because of their political views and that the White House had a policy of ejecting dissenters from the president’s appearance10.” It was later revealed that the men who approached these three individuals were wearing an earpieces and wires, navy blue suits and lapels similar to that or Secret Service agents. The Secret Service denied that their agents were involved in the ejection – they claimed the Republican host committee forced them out9. Whether these individuals were targeted by government agents or local GOP members is irrelevant. These citizens did not interrupt the event and certainly did no break any rules or laws by having an anti-war bumper sticker on their vehicle. This incident, among the many others presented, represent the strong hand our government yields in mandating its current agenda and status quo. To comprehend such acts of the present day, one must understand the history and ethical implications that are deeply rooted behind government-run surveillance. In the following pages, we will discuss the many events, programs, and key figures that have built and led government infiltration to where it stands today. “Those who sacrifice freedom for liberty deserve neither” -- Benjamin Franklin11 The J. Edgar Hoover Era John Edgar Hoover (born: January 1, 1895; deceased: May 2, 1972) was the director and founder of the U.S. Federal Bureau of Investigation (FBI). He remained director for nearly five decades and until his death at the age of 77. During his tenure, Hoover was highly regarded by the U.S. public as a prominent figure in American democracy. Only in the years since his death, many allegations have surfaced and tarnished his image. His career endured eight different presidential administrations, including the Great Depression, World War II, the Korean War, the Cold War, and Vietnam. It is because of Hoover's long and controversial reign that FBI directors are now limited to ten-year terms. Hoover has frequently been charged with exceeding and abusing his position of authority. He was known to have investigated groups and certain individuals due to their political beliefs rather than suspected criminal activity. The FBI first conducted extralegal activities such as burglaries and illegal wiretaps under his command. In 1956, Hoover was becoming increasingly frustrated by Supreme Court decisions that limited the Justice Department's ability to prosecute Communists. At this time he formalized a covert "dirty tricks" program under the name COINTELPRO, or Counter Intelligence Program. COINTELPRO was a program operated by the U.S. Federal Bureau of Investigation with the intent to investigate and destroy organizations that were considered to have politically radical elements. While covert operations were incorporated throughout the FBI history, COINTELPRO is known to have been most active from 1956-1971, targeting non-violent civil rights groups such as Martin Luther King and the Southern Christian Leadership Conference (SCLC). Other leftist political movements that were infiltrated include, most notably, the Black Panther Party (BPP) and the American Indian Movement (AIM), among others12. The main goal of COINTELPRO was to “expose, disrupt, misdirect, discredit, or otherwise neutralize” the activities of these groups and their leaders. Some of the main components of COINTELPRO included infiltration, psychological warfare from the outside, harassment through the legal system, along with extralegal force and violence. The FBI also incorporated “black bag jobs” into the program, which were warrant-less entries targeted against certain groups, most notably the BPP. The program remained top secret until a burglary by a group of left-wing radicals in 1971. The Citizens’ Commission to Investigate the FBI uncovered and removed several thousand files and passed them on to news agencies with the intentions to have them published. Many refused to publish the information and within months, Director Hoover declared that COINTELPRO was over and that future operations would be handled on a case-by-case and need-to-know basis13. In 1976, a major investigation into COINTELPRO was undertaken by the Select Committee to Study Governmental Operations with Respect to Intelligence Activities of the U.S. Senate, which was commonly referred to as the “Church Committee” due to its chairman, Senator Frank Church of Idaho. This Committee documented the entire history of the FBI being used for the purpose of political repression – dating as far back as World War I, when they were accountable for gathering ‘anarchists and revolutionaries’ for deportation – and building from the mid 1930s up until 1976. In a Final Report to the Select Committee, COINTELPRO was reprimanded with no uncertain charges: "Many of the techniques used would be intolerable in a democratic society even if all of the targets had been involved in violent activity, but COINTELPRO went far beyond that.. .the Bureau conducted a sophisticated vigilante operation aimed squarely at preventing the exercise of First Amendment rights of speech and association, on the theory that preventing the growth of dangerous groups and the propagation of dangerous ideas would protect the national security and deter violence13.” To this day, millions of documents remain unreleased and many of the released documents are entirely censored by the government. A Further Look into COINTELPRO After COINTELPRO was implemented to monitor the Communist Party in the U.S., Hoover decided to use these operations to investigate his concern that the Communist Party had infiltrated Black political organizations. This began an investigation on Black civil rights leader Dr. Martin Luther King, Jr. FBI surveillance of King began in 1957 and became more involved as his civil rights activities expanded and gained supporters, including an increasing number of agents assigned to monitor and disrupt the movement. By the end of 1963 COINTELPRO had expanded to cover Black activities and was known as the Black Hate COINTELPRO. During this time the FBI was monitoring not just King, but the Congress of Racial Equality, the Student Non-violent Coordinating Committee, the NAACP, and a number of other groups14. However, King was targeted as a main threat and was the focus of much investigation. In January 1963 Hoover wrote several memos which stated that King was associating with communists, and by the following spring was officially listed as a communist in the FBI Reserve Index. In October 1963, Attorney General Robert F. Kennedy approved the use of wiretaps against King, in addition to the hidden microphone surveillance that was also being used without Kennedy’s approval. These tactics were used for almost two years and were expanded to monitor King even more intensely. Stating that it was a “matter of national security” the FBI was allowed to place taps in the King home, the headquarters of the Southern Christian Leadership Conference in Atlanta and New York, as well as motel rooms in L.A., Atlantic City, Washington, D.C., Milwaukee, Honolulu, Detroit, Sacramento, and Savannah14. In a document written by FBI counterintelligence specialist Charles D. Brennan in September 1963, the reason for the measures of surveillance taken was that the amount of support the civil rights movement had gained over the past five years made it a clear threat to “the established order” of the U.S15. The surveillance was sanctioned for the sole purpose of determining how King had connections with the Communist Party USA; however, the information that was attained was used by the FBI to try to discredit him through a series of defamation attacks. The FBI monitored roughly five thousand of King’s phone calls over the years, but the surveillance revealed nothing about national security or communist infiltration. In 1964 the FBI made a composite tape of recordings from different hotel rooms that allegedly contained information about King’s sexual affairs. The tape was sanitized so as not to be traced back to the FBI, and was sent to King’s wife along with a note stating that the tape would not be made public if King committed suicide14. Around the same time period, other political groups were being investigated by the FBI in ongoing counterintelligence efforts. The Bureau began surveillance on the Nation of Islam and their leader, Elijah Muhammad. This surveillance was warranted because the FBI said that Nation of Islam members “disavow allegiance to the United States” and “are taught not to obey the laws of the United States.” Wiretap surveillance on Muhammad’s home in Chicago began in 1957, and when he purchased a home in Arizona in 1961, multiple wiretaps and microphones were installed there14. Malcolm X was one of the principle lieutenants of the Nation of Islam, but broke away in March of 1964 to establish a separate church called the Muslim Mosque, Inc., as well as a political Black organization called the Organization of Afro-American Unity. When this occurred the FBI became concerned about alliances between these groups and other influential groups. They undertook COINTELPRO actions to try to block alliances with white radical groups such as the Socialist Workers Party. At least 2,300 pages of material had been collected on him at the time of his assassination in February 1965. His assassination was stated to have been committed by former colleagues as a result of his splitting from the Nation of Islam. However in a memo written in 1969 the Chicago SAC stated that this factionalism had “been developed” by the FBI in hopes of squashing the movement. Four days after the assassination of Malcolm X, the FBI removed him from their security index. No one has ever been held legally responsible for the assassination, but one FBI agent wrote that he considered the murder to be a model for successful counterintelligence operations15. Ethical Frameworks Under utilitarian, duty-based, and rights-based ethical theories the act of heavy government surveillance policy is an ethical violation. From a utilitarian perspective, one must look at the consequences of an action, and determine which consequence would be the most desirable for the greatest number of people involved. In this case, the government is not acting in line with what is the greatest good for the greatest number. The greatest good is allowing a society to have the ability to freely participate and change the system in order to adhere to what is best for the people. By limiting radical political groups the government can effectively take away this ability. In taking the ability to change and progress away from the people in a democratic system the government violates the greatest good for the greatest number. The use of government surveillance to hinder radical movements is causing a “chilling effect” on political participation and results in an obstruction of social progress. The consequences of these government actions are undesirable, the actions are considered to be unethical under utilitarian or consequence-based theory. The duty-based and rights-based theories also show extreme surveillance to be an ethical violation. From a duty-based, or deontological perspective, heavy government surveillance is an ethical violation because it does not treat people in a universal or impartial way. Immanuel Kant, one of the most famous and influential deontological theorists, claimed that actions are unethical if they conflict with the idea that all people are free and rational beings. He stated that everyone has a duty to stop such unethical acts and promote freedom and rationality. Furthermore he stated that rules should only be applied if they are universal and impartial. Acts of government surveillance are often carried out with heavy biases against certain types of groups and ideologies, such as the civil rights or communist groups. In addition, using surveillance tactics against certain groups and individuals goes against the idea that people are free and capable of making their own decisions, and implies that people need to be monitored and controlled. Certain types of monitoring and controlling are necessary in any society, but in a democratic society when the control tactics goes as far to limit the effect the people can have on their own society then the system is not only undemocratic ,but unethical as well. The surveillance bias towards particular groups also violates several rules and regulations stated in our countries legal doctrines. Rights-based theory states that an action is unethical if it goes against rights that have been given through contract or law. Surveillance practices of the FBI and other government groups have shown to violate several laws and the rights that have been given to citizens by the government, such as freedom of speech, freedom of assembly, protection against illegal searches, and many more. In order to be ethical under a rights-based theory a democratic government must follow the laws and regulations set forth by the people’s elected government agents. Past and present government surveillance tactics violate these principles and are therefore unethical. “One does not establish a dictatorship in order to safeguard a revolution; one makes a revolution in order to establish a dictatorship.” -- George Orwell16 AT: Kritiks --- Terror Talk / Islamophobia No Link --- our argument was never that Muslims and Middle Easterners were the source of all terrorism. Our aff criticizes and curtails government policies that are based on this stereotype. Stabile, 14 --- J.D., University of California, Berkeley, School of Law, 2013 (February 2014, Emily, California Law Review, “Recruiting Terrorism Informants: The Problems with Immigration Incentives and the S-6 Visa,” 102 Calif. L. Rev. 235, Lexis, JMP) Notably, the argument that Muslims and Middle Easterners are in the best position to provide accurate intelligence on terrorist activities within their respective communities risks fueling the government's conflation of those communities with terrorism. n122 However, in analyzing how best to procure counterterrorism intelligence, it would be amiss not to recognize the FBI's and other law enforcement agencies' heavy focus on Muslim and Middle Eastern communities. This is largely due to most recognized foreign terrorist organizations being based out of the Middle East or having Islamic ties. n123 Law enforcement efforts, immigration law, surveillance policies, and pre-9/11 incidents like the 1993 attack on the World Trade Center have categorized the typical terrorist as male, Middle Eastern, and devoutly Muslim. n124 The reality is that even though recently immigrated Muslims and Middle Easterners have become synonymous with terrorism, terrorists come from various ethnicities, religions, and communities. n125 While acknowledging and attempting not to replicate that stereotype, this Comment seeks to recommend ways to improve the relationship between law enforcement and potential terrorism informants who typically belong to the same religion or ethnicity as those they surveil. The government's focus on Muslim and Middle Eastern communities as potential breeding grounds for terrorist groups also directs the focus of this Comment. However, this Comment resists the broad characterization of these communities as prone to extremism and violence. In fact, a recent statistical analysis of terrorism activity after 9/11 discredits the stereotype that Muslims and Middle Easterners account for most of the terrorism within the United States. n126 In total, the report found that U.S.-originated non-Muslims accounted for 107 post-9/11 plots while U.S.-originated Muslims accounted for 49. n127 Conversely, the report found that cooperation with Muslim communities helped prevent 40 percent of all Al-Qaeda plots after 9/11. n128 As the report notes, "[a] singular focus on Muslim terrorists is both bad for national security and civil society ... . Numerous studies and experts have stated that there is no reliable [*255] "terrorist profile.'" n129 When compared to the actual threat posed by members of Muslim and Middle Eastern communities, then, the FBI's explicit target of Muslim and Middle Eastern communities is excessive. AT: T Surveillance The plan ends “mapping” of Muslims and deployment of informants that are part of suscipionless surveillance Shahabuddin, 15 --- JD, Chapman University, May 2015 (Spring 2015, Madiha, Chapman Law Review, “"The More Muslim You Are, the More Trouble You Can Be": n1 How Government Surveillance of Muslim Americans n2 Violates First Amendment Rights,” 18 Chap. L. Rev. 577, JMP+AMP) Introduction When Imam Hamid Hassan Raza, leader of Brooklyn's Masjid Al-Ansar, meets newcomers at his mosque, he treads carefully. n3 After learning of the New York Police Department (NYPD)'s targeted surveillance of Muslim "hotspots" n4 such as [*578] Muslim businesses and mosques for counterterror intelligence gathering, he "is hesitant to approach newcomers until they are better known in the Masjid Al-Ansar community." n5 Due to multiple "chance" encounters with plainclothes police officers, n6 threats of his sermons being taken out of context and used against him, n7 and his fears of what being targeted by the NYPD would mean for his wife and child, n8 Raza has "considered leaving the pulpit." n9 Ironically, Masjid Al-Ansar is named after the Arabic word ansar, which means "the helpers" and in the Islamic tradition refers to the support and sense of community fostered during the time when the Prophet Muhammad and his followers had newly arrived to the city of Madina. n10 After the Associated Press broke the news about the NYPD's "Muslim Surveillance Program" in August 2011, n11 mosque congregants grew even more suspicious of newcomers [for fear they were informants], and a constant sense of suspicion now exists among the mosque's congregants. There [was] ... a steep decline in mosque attendance, as the number of worshippers attending afternoon prayers on weekdays ... declined from approximately twenty people to just two or three people. n12 A once "vibrant and lively mosque community" dwindled into a fearful group of isolated individuals apprehensive about the consequences of their mosque attendance and regular interaction with others in their community, disallowing the opportunity for Masjid Al-Ansar to live up to its name. n13 Raza in particular found that his wariness of new mosque attendees prevented him from [*579] "effectively [fulfilling] his role as a religious and spiritual counselor and teacher." n14 On June 18, 2013, the American Civil Liberties Union (ACLU), Creating Law Enforcement Accountability and Responsibility (CLEAR) Project, and New York Civil Liberties Union (NYCLU) filed a lawsuit on behalf of Raza (the named plaintiff) and other Muslim individuals who were targeted by NYPD surveillance, alleging that they suffered injuries caused by such conduct. n15 The lawsuit was filed against the City of New York, Mayor Bloomberg, Police Commissioner Raymond W. Kelly, and other city officials. The complaint alleged "suspicionless surveillance" of "mapped" Muslim individuals and organizations and the deployment of informants "without any suspicion of wrongdoing." n16 Raza v. City of New York represents one of the more recent and publicized legal challenges to the government's surveillance of Muslim Americans without any other indication of suspicion or wrongdoing except being Muslim, or perhaps, as this Comment will discuss, being "too Muslim." n17 On April 15, 2014, after months of public outcry - and undoubtedly bad press n18 - the NYPD announced it would disband the controversial and constitutionally suspect "Zone Assessment [*580] Unit" (formerly called "Demographics Unit") within their department used to map Muslim communities in the region. n19 This action by the NYPD could be heralded as the right step towards ending the stigmatization of religious expression by Muslim Americans and tells us that it is possible to refrain from alienating and burdening an entire religious community in the name of counterterrorism. Despite this move, however, some question whether it will mean any real difference. n20 This Comment will argue that the government's targeted, suspicionless surveillance of Muslim Americans in the name of counterterror efforts has effectively restricted the Muslim community's First Amendment freedoms of association, religion, and speech. Part I will discuss a brief background of surveillance, leading up to a report on the current effects of surveillance programs on Muslim Americans today. The discussion in Part II will turn to the case law and legal standards for First Amendment claims in the context of Muslim surveillance, advocating for and applying the strict scrutiny test to establish that the government's conduct has in fact infringed on Muslim Americans' rights to free association, religion, and speech. Part III will then conclude by offering solutions to counterterror efforts which do not criminalize mere adherence to a particular faith, including a cease of widespread government surveillance (i.e., not treating Muslims as a suspect class) and offering gang intervention models as a possible alternative to the current practice of government counterterrorism programs. Plan restricts political surveillance Fisher, 4 --- Associate Professor of Law and Director, Center for Social Justice, Seton Hall Law School (Winter 2004, Linda E., Arizona Law Review, “Guilt by Expressive Association: Political Profiling, Surveillance and the Privacy of Groups,” 46 Ariz. L. Rev. 621, Lexis, JMP) [*645] Political surveillance is defined as an array of techniques employed by government agents to investigate and record the political and religious beliefs and activities of those engaged in First Amendment expression, ranging from infiltrating and disrupting organizational leadership to observing and recording public events. n155 Note that the definition does not include terrorism investigations that are not based on First Amendment expression. Islamophobia Aff 1ac Islamophobia Affirmative The government’s discriminatory surveillance policy constructs Muslim Americans as criminals --- this spills over to violate the rights of others Kundnani & Kumar, 14 (7/14/2014, Arun Kundnani is the author of "The Muslims Are Coming: Islamophobia, Extremism, and the Domestic War on Terror", Deepa Kumar is the author of "Islamophobia and the Politics of Empire", “Stop spying on Muslim-Americans,” http://www.timesunion.com/opinion/article/Stop-spying-on-Muslim-Americans-5620920.php, JMP) The U.S. government has been snooping on prominent members of the Muslim-American community, according to documents released by National Security Agency whistle-blower Edward Snowden and publicized in a story by Glenn Greenwald and Murtaza Hussain of the online publication Intercept. That story reveals that the NSA and FBI covertly monitored the emails of five Muslim-Americans who have "all led highly public, outwardly exemplary lives," the article said. Among the five is Faisal Gill, who served in President George W. Bush's Department of Homeland Security and is a longtime Republican Party activist. "I've done everything in my life to be patriotic," Gill told Intercept. "I served in the Navy, served in the government, was active in my community. I've done everything that a good citizen, in my opinion, should do." Another victim of this snooping is Nihad Awad, who heads up the Council on American-Islamic Relations, the largest Muslim civil rights organization in the United States. The three others are Asim Ghafoor, whom the article identifies as "a prominent attorney who has represented clients in terrorism-related cases;" Hooshang Amirahmadi, "an Iranian-American professor of international relations at Rutgers University;" and Agha Saeed, "a former political science professor at California State University, who champions Muslim civil liberties and Palestinian rights." It appears that the government spied on these five not on the basis of reasonable suspicion of involvement in criminal or terrorist activity but simply because of the expression of legitimate religious or political opinions that the government considers unacceptable. The Intercept article revealed what it called "blatant prejudice against Muslim-Americans." And it showed good proof: One NSA document instructed staff on how to draw up a target list for surveillance. In place of the target's real name, the memo used the following fake name: "Mohammed Raghead." These documents suggest that the government is viewing all Muslims — be they Arab, Asian or African-American — as suspect because of their membership in a religious community. And when their Islamic belief is combined with political opinions critical of U.S. foreign policy, they become even more suspicious — to the point of being treated as possible terrorists. This violates the First Amendment of the Constitution, which prevents discrimination on the basis of one's religious or political opinions. It is also a violation of the Fourth Amendment, which protects us from unlawful searches. The spying on Muslim-Americans is all too reminiscent of the FBI's COINTELPRO and the NSA's Project Minaret decades ago, which spied on people like Joan Baez, Jane Fonda and the Rev. Martin Luther King Jr. We have to strongly reject the surveillance of Muslim-Americans and recognize that an attack on the rights of one group of people inevitably fans out to others. As the U.S. labor movement once put it — an injury to one is an injury to all. These constructions create a broader state of violence against bodies of color --- this manifests in xenophobic profiling Wing 3, Bessie Dutton Murray Distinguished Professor of Law [Spring 2003, Adrien Katherine Wing is a Bessie Dutton Murray Distinguished Professor of Law at the University of Iowa College of Law. A.B. Princeton, 1978; M.A. UCLA, 1979; J.D. Stanford, 1982. This paper was presented at the Civil Rights symposium of the Louisiana State“Civil Rights in the Post 911 World: Critical Race Praxis, Coalition Building, and the War on Terrorism”, http://digitalcommons.law.lsu.edu/cgi/viewcontent.cgi?article=5987&context=lalrev&seiredir=1&referer=http%3A%2F%2Fscholar.google.com%2Fscholar%3Fq%3Dguantanamo%2B%2522critical%2Brace%2Btheory%2522%26btnG%3 D%26hl%3Den%26as_sdt%3D0%252C5%26as_vis%3D1#search=%22guantanamo%20critical%20race%20theory%22, 63 La. L. Rev. (2003)] To illustrate how race can be socially constructed, I will use myself as an example. In the United States, I am considered African American or Black American, with the defacto second class status that designation still implies. My parents and grandparents were all considered Black, even though some of them had very light skin. The most recent white person whom we can determine is an ancestor is my great-great grandfather, Confederate General Pierre Gustave Toutant Beauregard.35 We even have members of the African American group who look white, yet are still considered part of the Black group. In South Africa, where I have taught many times, I was considered part of the historically mixed race group known as Coloured, due to my light skin, wavy hair and other characteristics. 7 During the apartheid era, this group had a buffer status between the de jure most privileged whites and the least privileged black Africans.3 " In Brazil, I learned that my same features would classify me as White, with all the defacto privileges that the designation still brings in that society.39 The pan-ethnicity term "Arab" and the religious signifier "Muslim" have been socially constructed as a synonymous "race" in the United States.4° While there are over 1.2 billion Muslims worldwide, only 15% are Arab.41 In the U.S., it is unclear, but there maybe between 4-8 million Muslims, of whom 22.4% are U.S. born and 23.8% are African American.42 There may be 3 million Arabs in the U.S., originating from 22 countries,43 and the Arab American Institute has revealed the little known fact that nearly three quarters of Arab Americans are Christians." In an important case, St. Francis College v. Al-Khazraji, the Supreme Court acknowledged that Arabs can be discriminated against on account of their race. Interestingly, those who merely look like Arabs or Muslims may be racially profiled on that basis as well. The double group can thus be considered larger than the number of actual members. According to one commentator, there may be, in this country, 7 million Arabs, 8 million Muslims, and 1.6 million South Asians, Latinos, and African Americans who could look "Arab," probably at least 10 million people,46 which I think even that is a vast underestimate of the numbers of the Blacks and Latinos in America who could pass as Arab. One African American radio personality stated that French citizen Zacharias Moussaoui, native of Morocco, who may have been the twentieth September 11 hijacker, looks like "a brother from around the way.' When my sons and I travel abroad, we are often mistaken for Arabs or Muslims. My partner James, who is a dark brown skinned Christian African American, often wears a kufi or skull cap to express his cultural affinity for Africa. He is always taken for a Muslim, although not an Arab. Sadly, I have told my NYU student son, who can phenotypically pass for Arab, that he has to be careful when flying so that he will not be mistaken for an Arab. Dressing in the popular ghetto styled baggy pants coupled with corn rowing his hair, and the use of an Ebonics dialect,48 helps ensure that he is not racially profiled as an Arab. Of course, when he lands in New York, his failure to be able to hail a cab indicates he is clearly seen as a Black - too risky to pick up.49 These two overlapping and socially constructed-as-synonymous groups, Arabs and Muslims, have come to be regarded in some of the negative ways that have historically characterized African Americans. While Arabs and Muslims are often stereotyped as dangerous, evil, sneaky, primitive, and untrustworthy, much as Blacks are, the criminality has a twist-they are considered potential or actual terrorists." They are forever "foreign, disloyal and imminently threatening,"'" whether they are citizens or not. Arabs and Muslims were racially profiled, victimized, and demonized as terrorists well before September 11 2 These activities have included: physical attacks by individuals and pro-Israel groups such as the Jewish Defense League; political attacks by pro-Israel lobby AIPAC and the Anti-Defamation League ofB'nai Birth, as well as many other Democratic and Republican Party affiliated entities; blacklisting of prominent Arab American intellectuals such as Columbia professor Edward Said and Harvard professor Walid Khalidi; as well as vicious stereotypes in films and television that would not be tolerated if used to characterize other groups.53 For example, Jack Shaheen surveyed a number of movies and found the following characterizations of Arabs and Muslims: "assholes," "bastards," "camel-dicks," "pigs," "devil-worshipers," "jackels," "rats," "rag-heads," "towel-heads," "scum-buckets," "sons-ofdogs," "buzzards of the jungle," "sons-of-whores," "sons-of-unnamed goats," and "sons-of-shecamels." 4 It is difficult to imagine the movie industry applying those sorts of labels to Blacks or Jews today. Arab American campaign contributions have been returned as if Arab citizens have no right to participate in American politics 5 3 Anti-Arab and anti-Muslim activities have intensified during periods of high tensions in the Middle East, such as the 1980 Iran Hostage situation, 1980-88 Iran-Iraq war, 1986 war against Libya, and the 1991 Gulf war.56 "The Supreme Court has upheld immigration laws discriminating against noncitizens on the basis of race, national origin and political affiliation that would patently violate the constitution if the rights of citizens were at stake."57 The cases include Harisiades v. Shaughnessy," Nguyen v. US.,59 Reno v American-Arab AntiDiscrimination Committee,6 ' Sale v. Haitian Centers Council, Incorporated,6 ' and The Chinese Exclusion cases.62 The plenary power doctrine has historically provided immunity from judicial scrutiny of immigration judgments, whether by Congress or the Executive branch. Many Americans assumed the Oklahoma City bombing of the Murrah federal building had to be done by Arabs or Muslims, rather than by white Christian militia member Timothy McVeigh.' After that incident, even though Arabs and Muslims were not involved, draconian immigration laws were passed in 1996 which singled out those groups. 65 Unfortunately, what happened to Arabs and Muslims under these 1996 laws was not unique. According to Kevin Johnson, these laws are part of a history of attempts to stiffle dissent that includes the Alien and Sedition Acts of the 1790s and the Palmer Raids after World War 1.66 In that period after the war, the U.S. imprisoned people for years for speaking out against the war effort.67 During the cold war Red Scare, many people lost jobs and were subject to investigation, or were even imprisoned, because of rumored association with the Communist party.6 According to Jerry Kang, "wartime coupled with racism and intolerance creates particular types of mistakes. Specifically we overestimate the threat posed by racial 'others,' in WWlI, Japanese Americans; today, Arab Americans, Muslims Middle Easterners, immigrants and anyone who looks like 'them . ,9, ? The Antiterrorism and Effective Death Penalty Act of 1996 (AEDPA)70 made it a crime to contribute to foreign groups deemed as terrorist, and created special deportation procedures, including the formation of special courts to evaluate secret evidence. 7 ' The Illegal Immigration and Immigrant Responsibility Act of 1996 (IIRIRA)72 supplemented AEDPA. That act prevents federal courts from reviewing a variety of immigration cases, with very limited exceptions. 3 These two laws "either explicitly-or according to INS interpretation, impliedly-authorize the use of classified evidence to exclude an 'alien terrorist' under special removal proceedings,74 to summarily remove an alien who is a 'national security' risk,7 and to deny bond to aliens in removal proceedings."76 Pursuant to these statutes, the Immigration and Naturalization Service (INS) deported or attempted to deport more than two dozen people on the basis of secret evidence-almost all were Muslim, mainly Arabs. 77 Ironically, in 2000, Republican Presidential candidate George W. Bush accused the Clinton administration of racial profiling when it used secret evidence.78 After September 11 the situation affecting Arabs and Muslims dramatically worsened,79 and there have been profound effects on their civil rights.8 " Before that fateful date, 80% of Americans considered racial profiling wrong.8 After September 11, the polls reversed and 60% said profiling was fine, especially if directed against Arabs and Muslims. 82 U.S. Congressman John Cooksey of Louisiana likely expressed the sentiments of many when he stated on the radio, "If I see someone come in and he's got a diaper on his head and a fan belt around that diaper on his head, that guy needs to be pulled over and checked." 3 A survey done soon after September 11 said that nearly half would be in favor of having Arabs, including citizens, carry a special identification card.8 There were early reports that some Blacks and Latinos welcomed the law enforcement targeting of Arabs and Muslims.85 When I heard that comment, it reminded me that I preferred that my sons not be mistaken for Arabs when flying. On the other hand, I also realized that increased racial profiling of Arabs and Muslims has not meant that the long term racial profiling of African Americans has stopped. It merely means that my sons may be doubly profiled depending on the context. At the airport, they may be regarded as Arab terrorists, while at the taxi stand or ATM machine, they may be regarded as Black criminals.8 6 After September 11, Muslims and Arabs and people who look like them have been under siege." Over 1000 incidents of hate crimes were reported by February 2002.8 Even President Bush's Arab secret service agent was removed from an American Airlines plane. 9 Of five people who were killed, including a Sikh Indian, a Pakistani Muslim, an Egyptian Coptic Christian, and an Indian Hindu,9 none of them was a Muslim Arab, but all were socially constructed as such. The U.S. Justice Department opened up more than 380 investigations into violence or threats, which have taken the form of "telephone, internet, mail and face-to-face threats; minor assaults, assaults with dangerous weapons, and assaults resulting in serious injury or death; and vandalism, shootings, and bombings directed at homes, businesses, and places of worship."9 ' About 70 state and local criminal prosecutions were instigated against 80 defendants. 92 According to Bill Hing, Arabs and Muslims, whether citizens or not, are literally and figuratively being deAmericanized, which is "a twisted brand of xenophobia that is not simply hatred of foreigners, but also hatred of those who may not be foreigners but whom the vigilantes would prefer being removed from the country anyway."93 A member of the U.S. Civil Rights Commission has even said that in the event of another terrorist attack, the American government might consider interning Arab Americans,"4 reminiscent of the treatment of 120,000 Japanese and Japanese Americans in World War II.9 Maintaining even limited federal surveillance condones discrimination --- it is a “yesno” question, not one of degree Horwitz, 14 --- covers the Justice Department and criminal justice issues nationwide for The Washington Post (12/8/2014, Sari, “Justice Dept. announces new rules to curb racial profiling by federal law enforcement,” http://www.washingtonpost.com/world/national-security/justice-dept-to-announce-newrules-to-curb-racial-profiling-by-federal-law-enforcement/2014/12/07/e00eca18-7e79-11e4-9f3895a187e4c1f7_story.html, JMP) The Obama administration on Monday formally announced long-awaited curbs on racial profiling by federal law enforcement, but the new rules will not cover local police departments, which have come under criticism in recent months over allegations that their officers profile suspects. Attorney General Eric H. Holder Jr. expanded Justice Department rules for racial profiling to prevent FBI agents from considering gender, national origin, religion, sexual orientation and gender identity, in addition to race and ethnicity, when opening cases. The department also is banning racial profiling from national security cases for the first time. Holder’s revised policy covers state and local law enforcement officers while they participate in federal law enforcement task forces. But it is considered only guidance for police officers in state and local departments. The profiling rules come at a time of racial tension around the country after the recent deaths of three African Americans at the hands of police in Ferguson, Mo., New York and Cleveland, and the absence of criminal charges against the white police officers who were involved. “As attorney general, I have repeatedly made clear that profiling by law enforcement is not only wrong, it is profoundly misguided and ineffective,” Holder said. “Particularly in light of certain recent incidents we’ve seen at the local level, and the widespread concerns about trust in the criminal justice process, it’s imperative that we take every possible action to institute strong and sound policing practices.” A Justice Department official said the goal is for federal law enforcement agencies to “model” these policies, proving to state and local authorities that successful policing does not require profiling. Holder held a conference call Monday with local law enforcement leaders to brief them on the policy and encourage them to adopt it. “At this historic moment in our nation’s race relations, the release of this revised guidance is an important signal of progress, but it does not completely address the need for reform of policing tactics at the state and local level,” said Laura W. Murphy, director of the American Civil Liberties Union’s Washington legislative office. The rules also apply for the first time to many activities at the Department of Homeland Security, including all Immigration and Customs Enforcement civil immigration enforcement, U.S. Coast Guard law enforcement activities, Border Patrol activities not near the border, DHS officers protecting government buildings and federal air marshals. But DHS officials will not be covered by the new racial profiling ban when they screen airline passengers and guard the country’s Southwestern border. Customs and Border Protection, for example, still will be allowed to use profiling when conducting screenings and inspections at the country’s ports of entry and interdictions of travelers at the border, government officials said. Secret Service protective activities also will not be covered by the rules. “Having a particular skin color, religious belief or last name is not a crime,” said Rajdeep Singh, director of law and policy at the Sikh Coalition, the largest Sikh American civil liberties organization. “This is not a 50-50 issue. The Obama administration can either ban profiling or allow it. It sounds like they’re committed to allowing it.” A fact sheet on the policy said that some DHS activity is not covered by the policy because of the “unique nature of DHS’s mission.” “This does not mean that officers and agents are free to profile,” according to the DHS fact sheet. “To the contrary, DHS’s existing policies make it categorically clear that profiling is prohibited, while articulating limited circumstances where it is permissible to rely in part on these characteristics, because of the unique nature of border and transportation security as compared to traditional law enforcement.” President George W. Bush banned racial profiling in 2003, but the prohibition did not apply to national security investigations and covered only race — not religion, national origin, gender or sexual orientation and gender identity. Civil rights groups and Democratic lawmakers have pushed for expanded anti-profiling protections since President Obama was elected in 2008. Holder began the process to revamp the rules in 2009 and considers the new policy one of the signature accomplishments of his tenure. About six months ago, the Justice Department delivered the rules to the White House. But they applied only to the department, and White House officials wanted the polices to cover additional agencies. The rules have been delayed in part because DHS officials pushed the White House and the Justice Department to allow major exclusions for agencies such as the Transportation Security Administration, Immigration and Customs Enforcement, and Customs and Border Protection. In several high-level meetings, DHS Secretary Jeh Johnson argued that immigration and customs agents and airport screeners needed to consider a variety of factors to keep the nation safe, according to officials familiar with his personal efforts. TSA officials argued that the rules should not apply to them because the TSA is not a law enforcement agency. In its fact sheet, DHS officials said that they will review activities not directly covered by the guidance to ensure that “we are including every appropriate safeguard and civil rights protection in the execution of those important security activities, and to enhance our policies where necessary.” But that was not enough assurance for civil liberties advocates. “It’s baffling that even as the government recognizes that bias-based policing is patently unacceptable, it gives a green light for the FBI, TSA and CBP to profile racial, religious and other minorities,” the ACLU’s Murphy said. “This guidance is not an adequate response to the crisis of racial profiling in America.” The federal government even uses it surveillance policies to manufacture terror plots --- this allows the FBI to continue destroying communities of color and maintain a climate of fear Cabral & Sutcliffe, 15 --- *photojournalist, filmmaker and cinematographer documenting stories seldom seen in mainstream media, AND **documentary filmmaker whose work explores issues of national security post-9/11 (1/26/2015, Lyric R. Cabral and David Felix Sutcliffe, “The FBI Isn’t Catching Terrorists — It’s Creating Them” http://creativetimereports.org/2015/01/26/fbi-counterterrorism-lyric-cabral-david-felixsutcliffe-sundance/, JMP) People think that catching terrorists is just a matter of finding them—but, just as often, terrorists are created by the people doing the chase. While making our film (T)ERROR, which tracks a single counterterrorism sting operation over seven months, we realized that most people have serious misconceptions about FBI counterterrorism efforts. They assume that informants infiltrate terrorist networks and then provide the FBI with information about those networks in order to stop terrorist plots from being carried out. That’s not true in the vast majority of domestic terrorism cases. Since 9/11, as Human Rights Watch and others have documented, the FBI has routinely used paid informants not to capture existing terrorists, but to cultivate them. Through elaborate sting operations, informants are directed to spend months—sometimes years—building relationships with targets, stoking their anger and offering ideas and incentives that encourage them to engage in terrorist activity. And the moment a target takes a decisive step forward, crossing the line from aspirational to operational, the FBI swoops in to arrest him. The targets of FBI stings are almost exclusively Muslim men between the ages of 15 and 35. They also tend to be angry, isolated and impoverished—in other words, eager for companionship and easy to manipulate. Many of the informants are well-remunerated con men with criminal histories, whom the FBI cannot guarantee won’t coerce targets into plots in order to secure their own paychecks. The stakes are high: informants stand to make as much as $100,000 over the course of a single investigation, not to mention considerable bonuses in the case of successful convictions. A recent example: on January 14, the FBI announced that it had interrupted an ISIS-inspired terrorist plot in the United States. Christopher Lee Cornell, a 20-year-old recent Muslim convert from Cincinnati, was allegedly plotting to attack the US Capitol with pipe bombs and gun down government officials. Cornell was arrested after purchasing two semiautomatic weapons from an Ohio gun store because the man that Cornell thought was his partner was actually an FBI informant. His plot was foiled by the FBI, after they ensured the cooperation of the store owner. We see the same story repeated over and over: of the domestic terrorism plots interrupted by law enforcement over the past decade, all but four were initiated by an informant-provocateur acting under FBI supervision. Conveniently for the FBI, network news anchors choose to parrot FBI press releases and herald suspects’ alleged associations with radical Islam, and the steady stream of “interrupted plots” provides the government with ample evidence that the terrorist threat is ever-present and that expanded surveillance is essential to national security. Less than a day after Cornell’s arrest, House Speaker John Boehner praised NSA spying for uncovering the plot—even though the FBI asserts that it learned of Cornell’s alleged activities through the informant. When pressed for details, Boehner refused to elaborate, saying only, “We’ll let the whole story roll out.” He added that lawmakers need to consider this particular plot when discussing amendments to the Foreign Intelligence Surveillance Act. Although then-Attorney General Alberto Gonzales released guidelines governing the FBI’s use of confidential informants in 2006, there is no congressional oversight of these activities. Even though Attorney General Eric Holder recently revised federal law-enforcement guidelines to limit racial profiling, and despite evidence that the FBI engages in profiling when identifying persons of investigative interest, the FBI will be exempt from these revised guidelines in the interests of national security. As recently as 2011, FBI counterterrorism training materials explicitly stated that most moderate Muslim Americans support terrorism and erroneously identified Islamic dress, prayer and even speaking Arabic as indicators of potential radicalization. The FBI is also no bastion of employee diversity: of the 13,766 special agents it employs, only 17 percent are “minorities,” reducing the opportunities for shifts in the bureau’s thinking on Muslims and other minorities. The cumulative effects of FBI surveillance and entrapment in communities of color have been devastating. Mosques have reported declines in membership as individuals choose to worship at home rather than risk monitoring. Imams have expressed reluctance to discuss the complexities of jihad, a frequently misunderstood tenet of the Islamic faith, for fear that their words may be misconstrued. Many Muslims are wary of donating to Islamic charities, both domestic and foreign, for fear of raising government suspicions. And on campuses across the country, Muslim student associations have banned discussions of politics, terrorism and the “war on terror.” It is unthinkable that a diverse and vibrant American community inundated with agents provocateurs should be prevented from engaging in vigorous and open dialogue. It is also unconscionable that $1.2 billion of our tax dollars are being funneled every year into these misguided tactics. After a recent screening of our film at a New York City mosque, a young African-American convert to Islam, sporting a brown full-body covering with matching hijab, confessed to us that she feels uncomfortable discussing aspects of her identity. She does not speak about her religious conversion in public, for fear of attracting or encouraging informants. The stated purpose of the FBI’s counterterrorism mission is to enable Americans to go about their daily lives without fear. But in addition to imprisoning hundreds of Muslim men caught up in the FBI’s informant-led traps, the agency has actively created and encouraged a pervasive climate of fear and suspicion among Americans exercising their constitutional right to freedom of religion. In fact, the FBI’s tactics have profoundly impacted law enforcement’s ability to maintain a relationship of trust with Muslim American communities, much to the detriment to our collective national security. Authorities must rein in the informant program, and institute immediate congressional oversight, if they sincerely aim to defend the liberty and security of all Americans, regardless of race or religion. The result is a vicious cycle --- the government’s identification of Muslim Americans as terrorists just serves to reinforce its racist surveillance policies. Recognizing current discriminatory policies and attitudes as a continuation of decades of exclusion and tolerating real dissent can break the stronghold of Islamophobia that controls the public sphere. Curtis, 12 --- Millennium Chair of the Liberal Arts at Indiana University-Purdue University Indianapolis (7/5/2012, Edward E. Curtis IV, “For American Muslims, Everything Did Not Change After 9/11,” http://religionandpolitics.org/2012/07/05/for-american-muslims-everything-did-not-change-after-911/, JMP) “Everything changed after 9/11.” This political mantra has become part of our national life. It is invoked to explain war-making in foreign lands, the creation of government departments such as Homeland Security, and the expansion of federal surveillance powers, both at home and abroad. In the past decade, it has also drawn special attention to the presence of Muslims in the United States. Scholars, analysts, and policy-makers have emphasized the unique nature of the threat posed either by or to Muslim Americans in the post-9/11 era. On the one hand, the administrations of both George W. Bush and Barack Obama have identified the radicalization of Muslim Americans as one of the greatest security problems faced by the United States today. On the other hand, civil libertarians, immigration activists, and progressives have decried the violations of Muslims’ civil rights in the course of prosecuting the war on terrorism. Both of these rhetorical strategies mean to call attention to the post-9/11 Muslim American. And yet, both rhetorics are also a form of forgetting, a severing of Muslim Americans from their deep roots in U.S. history. A key theme resounds in Muslim American history: the belief that Muslim American dissent is a threat to national security. Dissent does not equal terrorism (more about that shortly), but the fear that Muslim American dissent begets violence was a concern long before 9/11. There are important similarities between pre-9/11 and post-9/11 state surveillance of Muslim Americans. For much of the twentieth century, it was not Muslim immigrants, but rather indigenous African American Muslims who were, from the point of view of federal authorities, the public and potentially dangerous face of American Islam. The parallels between earlier and later periods of state surveillance are striking. We seem to be living in a new age of consensus in which, like the late 1940s and 1950s, a vital center has identified Islamic radicalism, and by extension Muslim American dissent, as an existential problem, a dangerous expression of extremism. It hasn’t always been this way. One common mistake is to assume that prejudice toward Muslims is unchanging and static. To be sure, fears of Muslim aggressors in North America are as old as the Puritans and other Europeans who brought such phobias with them from the Occident. And certain common features of Islamophobia—ideas about Islam and Muslims as violent, misogynistic, and backward—have remained potent throughout U.S. history. But our national discourse on Islam in the past two centuries has been far more dynamic and rich than this. In the pre-Civil War period, for example, the administration of President John Quincy Adams identified enslaved Muslim Americans as foreigners who were friendly to American interests. His secretary of state, Henry Clay, mistook these West Africans for Moors, or North Africans, and argued that by freeing and repatriating them, the young nation might be able to improve relations with the Barbary states against whom the United States fought its first foreign war. With Clay’s approval, Abdul Rahman Ibrahima, an enslaved Muslim, was feted up and down the East Coast by some of the United States’ most important citizens, including David Walker, the Tappan brothers, Francis Scott Key, and Edward Everett. The Origins of American Islamophobia So what happened? How did domestic Muslims go from being rather friendly—if not misunderstood— foreigners to dangerous dissenters? At what point did domestic Muslims become a major threat to the American nation-state? The origins of government-supported Islamophobia emerged explicitly in the postWorld War I period. The U.S. acted on its fears of physical and ideological pollution through immigration laws, like the 1924 National Origins Act, as well as through the suppression of organizations like Marcus Garvey’s Universal Negro Improvement Association. Fueling national suspicion of African American Muslims was the fear that immigrants of color were bringing political diseases like Bolshevism and anticolonialism with them, and that such disease would spread among black people. There was much at stake, since enormous federal, state, and local resources were maintaining Jim Crow segregation. Terrifying predictions of America’s people of color uniting with colonized people abroad ensued, and the federal government put Islam among black Americans at the front of its surveillance agenda. Nonetheless, the formation of American Islam as a simultaneously religious and political response to colonialism and racism only accelerated in the 1930s. In 1930, W. D. Fard, a person of color whose background remains contested, founded the Nation of Islam (NOI). Other black-led Sunni organizations followed suit, founding groups in Cleveland, Brooklyn, and along the East Coast; many of them eventually convened in Philadelphia in 1943 to form the United Islamic Society of America. The FBI viewed the transnational ties and diasporic consciousness of these black Muslim Americans as truly dangerous. This perception only worsened when thousands of African Americans, Muslim or not, put their hopes in the messianic prophecy that the Empire of Japan would liberate them from the cage of American racism through a military invasion. During the late 1930s and early 1940s, black Muslims, black Jews, advocates of black emigration to Africa, and black advocates for pan-Asian solidarity declared their public support for Japan, a fellow “colored” nation. A Japanese national, Major Satokata Takahashi, formed a “Development of Our Own” group to galvanize such feelings in Detroit, Chicago, and St. Louis. Several African American leaders appropriated Takahashi’s ideas. As the fear of a Japanese invasion spread in the early 1940s, the U.S. government arrested African American leaders suspected of stoking such feelings. Among the twenty-five leaders charged with sedition was Elijah Muhammad, leader of the Nation of Islam. Muhammad was acquitted of the sedition charge but was jailed for refusing to register for the military draft. Radicals and Counter-Intelligence After World War II, federal agencies experimented with different approaches to neutralizing the political power of African American Islam, culminating in extensive counter-intelligence operations against the Nation of Islam and other Muslim groups. One strategy was the denial of First Amendment protections to Muslim prisoners. The Justice Department argued that since the NOI was not an authentic religious movement—but rather a “cult” that operated as political organization—its followers in prison did not have the right to meet or conduct religious services.By redefining Islam as a “cult” the government could avoid the messiness of legal protections for religious expression. As was often the case, the word “cult” was used to label a religion that lots of people disliked or feared. Making out the Nation of Islam to be a cult was an easy argument to make, if not in federal court then at least in the media. The FBI’s campaign against the NOI also included commissioning and releasing to the public sociological scholarship that depicted black Muslims as false ethnics. In the early 1960s the Bureau commissioned a full-length monograph on the NOI; it argued that the African American identification with Islam represented a psychologically dysfunctional association of black Americans with a foreign culture. Mainstream media echoed these claims, covering black Muslims as deluded fakes. Despite such disinformation, the Nation of Islam achieved success as perhaps the most prominent black nationalist organization in the late 1950s and early 1960s. NOI also emerged, at least for a period, as the preeminent challenge to the liberal promise of the civil rights movement. This is why Martin Luther King, Jr., singled out the NOI for special attention in his Letter from the Birmingham Jail in 1963. The NOI and African American Islam more generally also became a symbol of black American resistance to U.S. foreign policy in the developing world, especially in Vietnam. NOI created what Penny Von Eschen called “a space—for the most part unthinkable in the Cold War era—for an anti-American critique of the Cold War.”Elijah Muhammad and Malcolm X lauded the rise of independent Muslim-majority nations, and sought to become allies of third-world Muslim leaders. After Malcolm X separated from the Nation, he became even more politically radical.But there was no more effective symbol of both domestic and international political resistance to U.S. power than Muhammad Ali. Ali, a hero to many people of color and leftists around the world, was seen as a fifth column—the enemy inside the walls—by the U.S. government, which sought to blunt his rising popularity by convicting him in 1967 of draft evasion. It was by then a familiar way of dealing with troublesome black Muslims. In the second half of the 1960s, at the height of U.S. troop commitment in Vietnam and with the rise of Black Power groups like the Panthers, the federal government adopted even more aggressive techniques to either destroy or at least transform the Nation of Islam. Its weapon of choice was the Counter-Intelligence Program, better known as COINTELPRO. Though the FBI had long run surveillance on the Nation, COINTELPRO represented an escalation of government interference, a high water mark of pre-9/11 fears about the Muslim threat to the United States. Counter-intelligence operations included the placement of agents inside an organization, often within the leadership structure; the spreading of dissension; and the planting of false information. Cutting its teeth on the New Left, white hate groups, and the Communist Party in the early 1960s, COINTELPRO expanded its operations in 1967 to include “Black Nationalist-Hate Groups.” This category of COINTELPRO included 360 separate operations, becoming the second largest area of all domestic counter-intelligence operations. The NOI was perhaps the most popular target of all the Black Nationalist groups. In 1968, the FBI’s field office may have begun a campaign to install W. D. Mohammed as Elijah Muhammad’s successor, writing in one declassified memorandum that Wallace was “the only son of Elijah Muhammad who would have the necessary qualities to guide the NOI in such a manner as would eliminate racist teachings.” Whether the FBI’s paper support for W. D. Mohammed translated into operational support inside the NOI is not yet known. But we do know that under his leadership, the NOI became a downright patriotic organization with flags waving in the mosques. Parallels with the Post 9/11 Era The public face of Muslim America has changed since the 1960s. It is no longer represented by bow-tied black men hawking copies of Muhammad Speaks or the beautiful, semi-naked body of Muhammad Ali. Despite the fact that the largest single ethnic-racial group of Muslims in the United States is still people of African descent, the stereotypical Muslim is now brown rather than black. What changed? What explains the shift? It wasn’t the Nation of Islam. While the original Nation became a Sunni organization under the leadership of Imam W.D. Mohammed and changed its name several times, Minister Louis Farrakhan recreated a version of the Nation of Islam in 1978 that followed Elijah Muhammad’s teachings. He was able to attract thousands of followers. A million men showed up in 1995* at a march he led in Washington, D.C., proving that the Nation of Islam still had great appeal. It wasn’t the Nation that changed. It was the government: the FBI no longer saw the NOI as a major threat. Today, the transnational Muslim American terrorist has become the primary focus of domestic counterintelligence. This was largely a result of 9/11, though the FBI and other agencies were already at work trying to blunt the threat of Islamic terrorism before then. Their concern grew amidst the larger phenomenon of Islamism, or political Islam, which flowered in the 1970s as a religious and political response to repressive governments in Asia and Africa and to U.S. foreign policy. In the aftermath of the Iranian revolution in 1979, foreign policy analysts, think tanks, and politicians interpreted Ayatollah Khomeini’s consolidation of power to be a new trend: the emergence of Muslim militant groups and governments bent on opposing the United States and its allies for religious reasons. In one sense, these analysts were right to fear an increasing threat to U.S. power emanating from groups that based their political platform on Islamic ideas and symbols. In this era of global religious revival, many Muslim political parties and activist groups organized around Islamic themes and institutions, often because they lived in politically repressive countries where the government did not allow for freedom of assembly, association, or speech in other venues. Religious organizations and religious sites were among the last places where people could congregate and by default provided a space for political protest. The administrations of both Jimmy Carter and Ronald Reagan saw opportunities to advance U.S. interests by allying with some of these Muslim resistance groups and their Muslim American supporters. In 1979, President Carter met with twelve leaders of various Muslim American groups met to discuss how they might bring about a peaceful resolution to the Iranian hostage crisis. President Reagan and the U.S. Congress, as is well known, hailed the Islamist resistance to the Soviet Union, providing support via the CIA, Saudi Arabia, and Pakistan. What is less known is that the Reagan administration also allowed interested Muslim Americans to contribute to the efforts of the Afghan mujahidin via what was called the Jihad Fund of the Muslim Students Association. These alliances were alarming developments for those who saw Islam as in and of itself a form of terrorism. According to the 1980s bestseller, Terrorism: How the West Can Win, edited by Israeli Prime Minister Benjamin Netanyahu, the “world of Islam” invented terrorism in the middle ages, and even in the modern world, remained “medieval” in its outlook. In addition, the book claimed, Islam was, at its very heart, antidemocratic and intolerant of diversity.After the Berlin Wall fell in 1989 and the Soviet Union formally came to an end in 1991, stereotypes of “the Muslim as enemy” became even more prominent among U.S. foreign policy makers. Throughout the 1990s, Harvard professor and former National Security Council official Samuel P. Huntington popularized his “clash of civilizations” thesis, which argued that Islamic and other non-Western civilizations were fundamentally irreconcilable with Western civilization, and that conflict in the post-Cold War era would occur along religious and cultural lines. He claimed “the fundamental problem for the West is not Islamic fundamentalism. It is Islam, a different civilization whose people are convinced of the superiority of their culture and are obsessed with the inferiority of their power.” U.S. Presidents in the twenty-first century could not afford to be this simplistic and openly biased. The governments of both George W. Bush and Barack Obama adopted a different rhetoric toward Islam than that of Huntington. They attempted to incorporate and co-opt Islam in the name of U.S. interests. “Islam is peace,” declared George W. Bush on September 17, 2001. “Muslims make an incredibly valuable contribution to our country,” he said.Similarly, Barack Obama proclaimed in his 2009 address in Cairo that “Islam has always been a part of America’s story.” Rather than reject Islam outright, both presidents attempted to legitimize forms of Islam that were either apolitical or seemingly pro-American. At the same time, both Bush and Obama used classic COINTELPRO techniques from the 1960s to discipline Muslim American political activity. The Bush administration determined internally that it could wiretap its own citizens without judicial or legislative oversight. It detained material witnesses who were not granted the right of habeus corpus and rounded up 1,200 people in the frightening days after 9/11. Muslim American charities that provided non-military aid to organizations designated as terrorist groups, such as the Palestinian party Hamas, were raided and shut down. The U.S. also barred foreign Muslim scholars, such as Tariq Ramadan, from attending professional meetings or speaking on American soil. President Obama’s administration has largely continued the Bush era policies. Guantanamo Bay has remained open; the American mosque has remained a primary target of domestic counter-intelligence; and deportation of foreign nationals has actually increased. Obama personally ordered the assassination of Anwar al-Awlaki and Samir Khan, two U.S. citizens who produced speeches and web materials in support of al-Qaeda. Many civil libertarians saw their targeted killings as violations of constitutional guarantees of due process and trial by jury. More recently, the White House gave its support to the National Defense Authorization Act, which allows the executive branch to detain foreigners, and perhaps Americans, accused of “substantially supporting” terrorism indefinitely without trial. Domestically, the Obama administration has outlined its “Strategic Implementation Plan for Empowering Local Partners to Prevent Violent Extremism in United States.” One of the primary sites for implementation is the American public school, where teachers and students are to be trained to identity potential terrorists—people who, according to National Security Council official Quintan Wiktorowicz, use the word “infidel,” defend Osama bin Laden, or watch extremist videos. But rather than debating whether or not this or any other technique is particularly effective in combatting terrorism, my final question is this: is there a way in the midst of the war on terrorism to carve out more public space for Muslim American dissent? The government’s new consensus on terrorism has helped to convey the message that if you support controversial Muslim political parties or groups in Palestine, Chechnya, Afghanistan, Somalia, Yemen, Iran, etc., you should expect that you will be put under surveillance. If you say that you support al-Qaeda, you should expect the government will find a way to silence you—by whatever means practical. For many Americans, that may be an acceptable and even laudable restriction on free speech. But where does it end? There must be a distinction made between political dissent and terrorism. Dissent of various kinds can too easily be mistaken as the threat of violence or as violence itself. It’s happened before, when the government kept African American Islam under close surveillance. Today, if we open our national dialogue to include a greater variety of Muslim American and other dissenting views, I would predict that once again, many Americans would be offended by what they hear from their fellow citizens. Perhaps some Muslim missionaries will dream, as they did in the 1980s and 1990s, of converting all Americans to Islam. Perhaps others will defend Iran’s nuclear program. But you can also be sure that the first people to challenge these views will be other Muslim Americans. That kind of openness is exactly what we need. Defining dissent as unacceptable speech constrains Muslim American civic engagement and limits the political imagination of Muslims and non-Muslims alike. Instead, we should bring this and other forms of religious and political dissent into the public square. Such discussions must address the subject of Islam and Muslims in U.S. politics. Tens of millions of Americans, perhaps more than a hundred million Americans, hold strong opinions about Shariah, the Quran, and the Prophet Muhammad, worrying that Islamic religion fuels terrorism. Millions of other Americans, both Muslim and non-Muslim, explain Muslim terrorism not as the inevitable outcome of Islamic religion but instead as an understandable, if destructive, reaction to U.S. foreign policy. One of my admittedly modest ideas for furthering this discussion is to ask academics, policymakers, and community members to look again at the American past. Framing post-9/11 Muslim American life as an incomparable moment impoverishes our national conversations by depriving us the benefit of historical narrative, one that will allow us to seek new ways of thinking about our present. Muslims are not foreigners in U.S. history. Revisiting our colonial ancestors and fellow Americans from the nineteenth and twentieth centuries onward provides a space in which Muslim American dissent and contemporary fears about Islam might be safely explored, more deeply understood, and radically reimagined, even if we come to little agreement. As the past informs us, for Muslim Americans, everything did not change after 9/11. What did change deserves our scrutiny, and ultimately, our participation to insure dissenters—Muslim and non-Muslim alike—are welcome in American life. Islamophobia shapes US foreign policy—notions of western superiority are a critical tool to drum up support for militaristic and elitist interventions Kumar 13, Associate Professor of Media Studies and Middle Eastern Studies at Rutgers [09/11/13, Deepa Kumar is an Associate Professor of Media Studies and Middle Eastern Studies at the Rutgers University. She is the author of Islamophobia and the Politics of Empire and Outside the Box: Corporate Media, Globalization, and the UPS Strike being interviewed by Jessica Desvarieux, The Real News Network, “Twelve Years Post 9/11, Islamophobia Still Runs High”, http://truth-out.org/video/item/18759-twelve-yearspost-9-11-islamophobia-still-runs-high] KUMAR: Absolutely not. I think it is true that larger numbers of conservative voters are racist. They are racist not just in terms of their attitude towards Arabs and South Asians, but also to a whole host of other groups. So it's true that this idea sort of concentrated within those ranks. But in fact Islamophobia is far more systemic than that. That is to say, the idea of a Muslim enemy, the idea of a terrorist enemy is one that actually goes back a couple of decades but was brought to light after 9/11 by the political elite, by our political leaders. So in fact it is built into the system of U.S. foreign policy in this country. And to simply look at the far right and to ignore the fact that it has larger implications in terms of justifying U.S. foreign policy would be really to have only an incomplete picture of what is at work in this form of racism. DESVARIEUX: Okay. Let's talk about the mass media and how they depict Islam since 9/11. Can you describe for us how the mass media has depicted Islam? KUMAR: Well, basically, the trauma of 9/11, the fact that, you know, 3,000 Americans died meant that it enabled the U.S. media to actually draw on stereotypes that have been, you know, propped up by Hollywood, by the news media, and so on for a few decades before that. And that was the idea that these are crazy, irrational people. They are all apparently driven by Islam to violence. And so we should lock them up, we should be suspicious of them, we should detain them at airports, and so on and so forth. And so that's what you saw in the immediate aftermath of 9/11. And this show called 24, which your viewers may know, is--it's about a lot of things [incompr.] that it's about justifying the building of a national security state and justifying practices like torture and so on and so forth. DESVARIEUX: Okay. And also the story of the day, of course, is Syria, and everyone's attention is drawn to Syria. Can you describe for us just how does Islamophobia play a role in any of the arguments for intervention in Syria, really? KUMAR: Okay. It doesn't play a direct role in that. It is--the idea of humanitarianism has a long history in the United States. The idea that there are victims all over the world, that the U.S. government has then got to make war in order to, you know, somehow defend them, this goes back all the way to the Spanish-American war of 1898, which was supposed to be about rescuing Cubans. And similarly, you see these sorts of justifications given. You know, Vietnamese need to be defended. In Iraq, it was babies, apparently, who were being bayoneted in Kuwait, and therefore the U.S. needed to intervene and defeat Iraq in 1991. So this idea of humanitarianism has a long history within the foreign policy establishment. But what makes it particularly potent in this case is that after 9/11 what you see is the Bush administration projecting this idea of clash of civilizations, which is basically the notion that we in the West are democratic, we are rational, we are civilized, we are, you know, all things wonderful, and they in the East are barbaric, they're misogynistic, and so on and so forth, and therefore we have an obligation, what used to be called the white man's burden, to go off and rescue them. And so you see some of that language, which is the idea that Arabs cannot bring democracy by themselves, they cannot make change, and so we need to intervene. So it's a combination both of the victim narrative, which has a long history, combined with this language of clash of civilizations. DESVARIEUX: Okay. And how does this fit into domestic policy? How do they work Islamophobia into domestic policy? KUMAR: Right. I mean, the comparison I make in the book and that I'm actually working on in the next book is that the U.S. government, and U.S. imperialism in particular, always needs an enemy. That is, when there is no humanitarian cause, an enemy is an extremely useful way to justify wars abroad, as well as the policing of dissent at home. So, for instance, during the Cold War we had been menacing enemy of the Soviet Union, against whom both a hot and a Cold War had to be waged. And, of course, this justified, then, McCarthyism, because there's always a reflection of the external enemy inside, and these people have to be rounded up, blacklisted, and so on and so forth. So that's the logic back then, and, of course, it was entirely about a politics of fear. Today we have the same sort of thing. After 9/11, the war on terror comes into being precisely about fighting endless wars. Remember, back in 9/11 the Bush administration was going to start with Afghanistan, go to Iraq, and then Iran, Syria, and so on and so forth. It didn't work out that way. But the idea was to drum up this fear of this menacing terrorist enemy, which justified wars all over the world in order to gain the U.S.'s interest in [incompr.] particularly in the oil-rich region in the Middle East. You asked me about domestic politics. Always there was a reflection of the domestic in terms of the international threat. And so what you've seen is innocent Muslims--and often actually not even Muslims, people from the Middle East, North Africa and South Asia, some of them Sikhs, some some of them Hindus, some of them Christians, and so on, being racially profiled because that is the logic that comes out of this. I have a whole chapter in the book about how the legal system has been reworked so as to justify things like indefinite detention, things like torture, things like deportation. And, frankly, the infiltration of agents into our schools, into my school, into colleges, and so forth. So, you know, it's truly horrific the extent to which Muslim Americans and people who look Muslim have been demonized since 9/11. This dehumanization of foreign populations establishes continuous cycles of violence --- the way we discuss this issue matters John Collins 2, Ass. Prof. of Global Studies at St. Lawrence, and Ross Glover, Visiting Professor of Sociology at St. Lawrence University, 2002, Collateral Language, p. 6-7, The Real Effects of Language) As any university student knows, theories about the “social construction” and social effects of language have become a common feature of academic scholarship. Conservative critics often argue that those who use these theories of language (e.g., deconstruction) are “just” talking about language, as opposed to talking about the “real world.” The essays in this book, by contrast, begin from the premise that language matters in the most concrete, immediate way possible: its use, by political and military leaders, leads directly to violence in the form of war, mass murder (including genocide), the physical destruction of human communities, and the devastation of the natural environment. Indeed, if the world ever witnesses a nuclear holocaust, it will probably be because leaders in more than one country have succeeded in convincing their people, through the use of political language, that the use of nuclear weapons and, if necessary, the destruction of the earth itself, is justifiable. From our perspective, then, every act of political violence— from the horrors perpetrated against Native Americans to the murder of political dissidents in the Soviet Union to the destruction of the World Trade Center, and now the bombing of Afghanistan—is intimately linked with the use of language. Partly what we are talking about of “manufacturing consent” and shaping people’s perception of the world around them; people are more likely to support acts of violence committed in their name if the recipients of the violence have been defined as “terrorists,” or if the violence is presented as a defense of “freedom.” Media analysts such as Noam Chomsky have written eloquently about the corrosive effects that this kind of process has on the here, of course, are the processes political culture of supposedly democratic societies. At the risk of stating the obvious, however, the most fundamental effects of violence are those that are visited upon the objects of violence; the language that shapes public opinion is the same language that burns villages, besieges entire populations, kills and maims human bodies, and leaves the ground scarred with bomb craters and littered with land mines. As George Orwell so famously illustrated in his work, acts of violence can easily be made more palatable through the use of euphemisms such as “pacification” or, to use an example discussed in this book, “targets.” It is important to point out, however, that the need for such language derives from the simple fact that the violence itself is abhorrent. Were it not for the abstract language of “vital interests” and “surgical strikes” and the flattering language of “civilization” and ‘just” wars, we would be less likely to avert our mental gaze from the physical effects of violence. Thus: The United States federal government should prohibit domestic surveillance based on race, religion, ethnicity, national origin, or First-Amendment-protected activity in the absence of at least reasonable suspicion of criminal activity and require the least restrictive means be employed when conducting criminal intelligence investigations. The plan provides the best safeguard against profiling and resolves the problem of informants Berman, 11 --- Counsel in the Liberty and National Security Project at the Brennan Center for Justice (Emily, “DOMESTIC INTELLIGENCE: NEW POWERS, NEW RISKS,” http://brennan.3cdn.net/b80aa0bab0b425857d_jdm6b8776.pdf, JMP) Substantive Recommendations Regardless of what additional procedural protections are implemented, some elements of the FBI’s existing powers simply permit too much government intrusion into the lives of innocent Americans and therefore should be curtailed in the following ways: 1. Prohibit the FBI from using highly intrusive investigative techniques unless there is some basis in fact to suspect wrongdoing.290 • This would prohibit tailing someone, posing as other people in order to mine information from neighbors and acquaintances, and recruiting informants to glean more information in the absence of some factual basis for suspicion. • This prohibition, summarily overturned by the 2008 Guidelines, was enshrined in all previous iterations of the Guidelines for decades. It is the single most important safeguard against profiling and other forms of abuse, and the government has offered no persuasive justification for its sudden disappearance. 2. Require agents to use the least intrusive investigative technique that is likely to prove effective. • The “least intrusive method” requirement has been part of the Guidelines since their inception. The current, equivocal language on this requirement in the Guidelines and the DIOG should be amended to stress its importance, even in terrorism investigations. 3. Prohibit improper consideration of race, religion, ethnicity, national origin, or First-Amendment-protected activity in investigative decisions. • Addressing this issue is most urgent in the context of rules regarding use of informants to collect information about First-Amendment-protected activity, such as infiltration of a place of worship or political gathering. Such activities should require higher levels of predication and more aggressive oversight of investigative decisions than activities that do not implicate Americans’ constitutional rights. • Even outside the First Amendment context, however, reform is necessary. One standard to consider was recently implemented by the Office of the Director of National Intelligence (DNI). The standard for use in the DNI’s Information Sharing Environment (ISE)-Suspicious Activity Reporting (SAR) system adopts a “behavior-focused approach to identifying suspicious activity” based on the standard announced in Terry v. Ohio,291 392 U.S. 1 (1968). It requires that “race, ethnicity, national origin, or religious affiliation should not be considered as factors that create suspicion (except if used as part of a specific suspect description).”292 This type of limitation on the use of these factors to justify law enforcement activity is crucial. Conclusion The time to act is now—before the Guidelines result in widespread and unwarranted intrusions into Americans’ privacy, harmful religious and ethnic profiling, and the divergence of scarce resources to ineffective and indiscriminate collection of information. The changes recommended above will go a long way to reduce the risk of excesses that the current Guidelines permit. They would reinvigorate the substantive standards on which investigative activity should be predicated and would ensure that intrusive investigative methods are used only when necessary. And they would impose internal and external checks to guarantee the lawful, effective use of the powers conferred on federal agents. In short, they would safeguard Americans’ rights of privacy, free expression, association, and religion as well as help to focus investigative activity where there are indications of threats. The result will be a safer, more just America. Voting affirmative recognizes the important role of government policies and rhetoric in promoting the racist environment Representative Ellison, 14 (12/11/2014, Rep. Keith Ellison (D-MN), US Official News, “Rep. Ellison Testifies in Senate Hearing on Civil and Human Rights,” Lexis, JMP) Office of the House of Representative Keith Ellison, U.S Government has issued the following news release: Rep. Keith Ellison (D-MN) testified in front of Senate Judiciary Committee on the Constitution, Civil Rights, and Human rights today during a hearing entitled “The State of Civil and Human Rights in the United States.” The hearing was chaired by Senator Dick Durbin (D-IL) and Rep. Ellison was joined by his colleagues Senator Cory Booker (D-NJ) and Rep. Luis Gutierrez (D-IL). Rep. Ellison’s written testimony submitted for the record to the committee is below. Last week 15 year old Abdisamad Sheikh-Hussein was run over by a man in an SUV that had a bumper sticker that said "Islam Is Worse Than Ebola" on it. Discrimination and hate exist everywhere and we should shine a light on them. Today I’d like to focus on state-sponsored violations of our civil rights and liberties and the context in which these violations occur. Why? Because the government’s job is to promote the general welfare. Because we entrust our government with the right to protect and serve our communities, we expect more of them. Most of the time our public servants diligently uphold this social contract; but when the state fails it is all the more devastating and deserves our attention. President Obama and Attorney General Holder have demonstrated leadership that has brought important reforms like the Hate Crimes Prevention Act, the repeal of Don’t Ask Don’t Tell, and the Fair Sentencing Act. We still have a long way to go. Our system of justice works for some, not all. This injustice takes place in a social and economic context. When Officer Wilson confronted Michael Brown on Canfield Drive in Ferguson, the interaction didn’t take place in a vacuum. Like many of our communities, Ferguson suffers from economic abandonment. Ferguson Missouri’s unemployment is 13%, over double the national average. The number of low-income people in Ferguson doubled over the last 10 years. In 2012, almost all of Ferguson’s neighborhoods had a poverty rate of over 20%, the threshold at which the negative effects of poverty emerge. Do we respond to this with policies that create jobs, improve infrastructure, and promote education? No. We build more prisons and give our police weapons designed for a war zone. Our low income and minority communities are over-policed and under-protected. We cannot continue to try to address our economic problems with criminal justice solutions. It isn’t fair to our communities. It isn’t fair to law enforcement. And it solves neither the criminal justice nor the economic justice problems. If we only buy body cameras and don’t address structural and economic inequality, we will find ourselves here again, year after year. We know we have an inequality problem when the CEO of Wal-mart makes over $12,000 per hour and the average Wal-mart employee makes $8.48, or when the CEO of McDonalds makes $9,200 an hour and the cashier makes $8.25. I’d also like to talk about another form of state sponsored discrimination – one that I have experienced myself. It isn’t a secret that I have experience with the divisive rhetoric and fear-mongering that some public officials use to gain power. Many will recall the House Committee on Homeland Security hearings to discuss the threat posed by Muslims in America. My request to broaden the hearing to include all forms of violent extremism was rejected. Now, years later, public officials around the country continue to use divisive rhetoric. A county commissioner in Coffee County, TN posted on his public Facebook page an image of a man holding a shotgun with the caption “How to Wink at a Muslim.” A state senator in Oklahoma said that American Muslims are a "cancer in our nation that needs cutting out." And in my own state of Minnesota, a GOP County chairman called Muslims parasites that should be fragged. To frag someone means to violently kill them. These are not rare occurrences. These examples demonstrate that these toxic views have spread. This type of bigotry is contrary to what we stand for as Americans, and when our public officials engage in it, it gives the American public a signal that it is ok to do the same. Public officials have an increased responsibility and when they begin to treat a particular group differently because of their faith, they should be called out and held accountable. Our words matter. Beyond changing the rhetoric, we have to change our policies. Shortly after he took office President Bush said that racial profiling is “wrong, and we will end it in America.” Over a decade later we still have bad policies on the books. In New York and many other US cities, Muslim communities are mapped, infiltrated, and surveilled simply because they are Muslim. The Departments of Homeland Security and Justice conduct extensive operations in Arab, Middle Eastern, Muslim, and South Asian communities under the guise of countering violent extremism. Study after study has shown that acts of violent extremism in the United States are motivated by a variety of ideologies and that only a small percentage are committed by American Muslims. According to the FBI, only 6% of acts of terrorism on American soil between 1980 and 2005 were committed by those Muslims. Yet, nearly all programming targeted towards countering violent extremism is geared towards Muslim communities. I am not against surveillance. I am against surveillance without reasonable suspicion. We should not be singling out communities and harassing and spying on them without cause. Intelligence gathering should never be based on religion or race. If you think this is just a “Muslim problem” – you’re wrong. Local law enforcement, encouraged by the federal government, raid Latino communities and workplaces. There is FBI surveillance, without suspicion, of Chinese and Russian communities in the US. And as we know, there is the routine practice of profiling African American young men. A young black man is 21 times more likely to be shot and killed by a police officer than his white counterpart. As the co-chair of the Progressive Caucus I have joined the chairs of the Congressional Black Caucus, The Congressional Hispanic Caucus, and The Asian Pacific Caucus to urge the Department of Justice to issue revised profiling guidance that will help stop law enforcement from discriminating against our citizens based on their religion, national, origin, ethnicity, and sexuality. Yesterday the Department of Justice issued the revised guidance that expands protections for some, but allows the FBI, TSA, and Border Patrol to continue mapping, monitoring, and targeting Americans based on their religion or what they look like. We should not continue to violate the civil liberties of our citizens in the name of national security. Discriminatory profiling is wrong. It doesn’t help prevent crime. It creates a culture of fear and resentment within our communities. It is contrary to our core constitutional principles when federal dollars are spent perpetuating law-breaking activity like entrapment. Effective mobilization will fail without the plan --- we must challenge the Islamophobic base of anti-terror legislation to stand in solidarity with all Muslims Diana Ralph 6, PhD in Psychology and a Master of Social Work. She is an Associate Professor of Social Work at Carleton University, "ISLAMOPHOBIA AND THE ‘‘WAR ON TERROR’’: THE CONTINUING PRETEXT FOR U.S. IMPERIAL CONQUEST", The Hidden History of 9-11-2001 (Research in Political Economy, Volume 23), Emerald Group Publishing Limited, pp.261-298, 911blogger.com/node/16381 4. Standing with Muslims against the “War on Terror”¶ In this chapter, I have demonstrated that:¶ The overriding motive for Bush’s ‘‘war on terror’’ is to secure control over the Middle East and Central Asia for U.S. oil, military, and corporate interests.¶ Bush’s handlers have been planning imperial conquest of the world since the Soviet Union collapsed in 1989. ¶ From the evidence here and elsewhere, it is difficult to draw another conclusion than that Bush’s associates organized the 9-11 attacks to kick start popular support for this war. They have continued to justify the ‘‘war on terror’’ by claiming that Muslim terrorists pose an immanent danger to Americans.¶ In fact, however, terrorism actually poses minimal risk to Americans.¶ The ‘‘war on terror’’ is a concept modeled on Israel’s assaults on Palestinians to provide a cover for campaigns of territorial conquest.¶ Far from being ‘‘under attack,’’ America has pre-emptively attacked and conquered two sovereign states, and is threatening military domination of the entire world. ¶ In other words, Bush’s ‘‘war on terror’’ is a massive con job, perpetrated by a few oil and military elites, at the expense of Muslims particularly, but threatening the security and well-being of virtually everyone on the planet.¶ An immensely wealthy and powerful republic has been hijacked by a small cabal of individuals... The American people have...been deliberately lied to, their interests cynically misrepresented and misreported, the real aims and intentons of this private war of Bush the son and his junta concealed with complete arrogance." (Said, 2003) ¶ Thomas Donnelly, author of the RAD blueprint for Bush’s ‘‘war on terror,’’ recently reaffirmed the neo-conservative commitment, not to protect Americans from ‘‘terrorism,’’ but to conquer the world.¶ This war, properly understood, is a struggle to build a [new] ... order throughout the ‘‘greater Middle East,’’ that giant swath of the planet that extends from West Africa to Southeast Asia. ...Operation Iraqi Freedom represented the first step in a generational commitment to Iraq, but also the commitment of many generations to transforming the greater Middle East....The vision of the Bush Doctrine is hugely ambitious; in embracing this great vision, the United States must obligate the resources and create the institutions necessary to realize it." (Donnelly, 2004, pp. ix, 111) ¶ 4.1. ‘‘Either you are with us, or you are with the Terrorists’’¶ Fear and hatred of a scapegoated ‘‘enemy’’ are powerful tools by which despots confuse people into believing that their oppressors are their salvation. Just as anti-Semitism served to divide and silence progressive German movements in the early Nazi era, Islamophobia is dividing and silencing us now. No one wants to associate with “terrorists”, much less be labelled and persecuted as one. Many progressive Western people fear and despise “fundmentalist” Muslims, and thereby fall into the trap of allying themselves with, or at least not opposing, Islamophobic laws and practices in the name of opposing “terrorism”. They thereby collude in undercutting the fabric of rights, due process, and equality on which they too depend.¶ The Bush Doctrine rhetoric has succeeded in convincing most white Americans that “terrorists” pose a serious threat to their personal safety, and that the “war on terror” is necessary to protect them. Islamophobic language and values have seeped into the fiber of our daily lives. Bookstores now have “terrorism” sections, displaying some of the 5,036 mostly new books on the topic.15 Several U.S. colleges and universities now offer degrees in “homeland security.” Media images of “Arab extremists” have become routine. ¶ Most Americans now believe that “terrorism” is such a big problem, that they should pay with their taxes, their freedoms, their decimated public services, and their children’s lives. In the summer of 2005, polls found that 79 percent of Americans believed that “the threat of terrorism against the U.S.” has increased or stayed about the same (Polling Report.com, 2005). Seventy-six percent thought “Osama bin Laden himself is currently planning a significant terrorist attack against the United States,” and 64 percent supported the Patriot Act. Sixty-four percent would be “willing to give up some of [their] personal freedom in order to reduce the threat of terrorism” (PollingReport.com, 2005). Almost half of all Americans “believe the U.S. government should restrict the civil liberties of Muslim-Americans” (Dean, 2005). In the wake of Hurricane Katrina and shocking revelations of torture at Abu Ghraib prison, however, popular support for the “war on terror” plummetted. In November, 2005, 55 percent of Americans disapproved of the way Bush is “dealing with the war on terrorism” (PollingReport.com, 2005).¶ 4.2. Which Side are you on?¶ Before 9-11, the anti-globalization movement had been rapidly gaining influence and unity worldwide. Opposition to U.S.-dominated institutions like the World Bank, the International Monetary Fund, the G-8, NATO and APEC, had succeeded in disrupting and exposing several of their gatherings. And in their place, the World Social Forum and other progressive people’s movements were demonstrating that indeed there are excellent alternatives to globalization and corporate rule.¶ The 9-11 “attacks” and the “war on terror” derailed these hopeful movements and imposed crippling constraints on dissent, democracy, and national sovereignty. Under cover of Islamophobic targeting of Muslims, the U.S. is waging war on all movements for social justice both domestically and internationally, using its new post 9-11 legislative powers and bloated military and policing budgets. Domestically, the Bush administration is attacking democracy, abortion rights, the judiciary, environmental protections, social security, public education, women’s rights, union rights, and civil rights (Dorhrn, 2003). Internationally, it pressures other nations to enact similar “anti-terror” laws and policies, as well as demanding that they open their economies to full U.S. corporate rule.¶ As Bernadette Dorhn points out: “The result is a chilling effect. That is to say, people around the targets back away, get silent, don’t stand up when they see the cost of simply expressing your opinion or even making a joke, let alone publicly objecting to what’s going on” (2003).¶ Many progressive groups oppose Islamophobia and support Muslim victims of U.S. and Israeli assaults. These include civil liberties associations, Amnesty International, Human Rights Watch, anti-Zionist Jewish and Christian groups, unions, peace groups, and student organizations like the Canadian Federation of Students. Secular, Jewish, and Christian groups have formed alliances with Palestinians and Iraqis in oppostion to the Israeli occupation of the West Bank. In the U.S. the Center for Constitutional Rights works to end arbitrary detention of Muslim detainees in Guantanamo Bay and elsewhere. In Canada, the Campaign to Stop Secret Trials in Canada has mobilized broad support for Muslim detainees and their rights.¶ However, even these groups have not dared to challenge the Islamophobic base of the “anti-terror” legislation, for fear of being called pro-terrorist. They are thereby left arguing that the particular individuals for whom they advocate aren’t terrorists, while implicitly condoning the myth that “real” terrorists are lurking in the shadows. But under the Bush Doctrine, all Muslims are presumed to be either current or potential terrorists, and their civil liberties have been sacrificed in the name of “national security”.¶ To defeat the Bush plot for world control, we will need to challenge Islamophobic fear of “terrorists”, to assert clearly that there is little substantive terrorist threat. What terrorism there is could better be addressed through criminal justice systems and international law. More importantly we need to insist that the U.S. desist from both overt preemptive wars and covert state-financed terrorism. The actual security of both Americans and all other people will be best served by ending the occupations of the West Bank, Iraq, and Afghanistan, and recognizing the right of all nations to self-determination (including oil policies). We need to stand in solidarity with all Muslims, regardless of their religious beliefs. At this juncture, Islamophobia is the key barrier to effective mobilization against the Bush regime. The chilling effect from surveillance dissuades people from meaningfully participating in social and political movements that are essential for progressive political change --- any change short the plan will spillover and stifle ALL radical resistance and eviscerate freedom of speech forever Burkhart, et. al, 7 (2007, Laurie Burkhart, Michael Haubert, and Damon Thorley, “The Efect of Government Surveillance on Social Progress,” in Confronting Information Ethics in the New Millennium, http://www.ethicapublishing.com/5CH1.htm, JMP) The Chilling Effect In United States law, the “chilling effect” refers to the stifling effect that vague or overbroad laws may have on legitimate speech and activity typically protected by the First Amendment.1 Theoretically, the “chilling effect” has a dramatic repercussion on citizens’ willingness to freely express their beliefs and opinions. In past U.S. history the “chilling effect” has been used in court cases as evidence against certain government surveillance tactics. In the Supreme Court case Socialist Workers Party v. Attorney General of U.S., the “chilling effect” was used as a basis for getting a preliminary injunction brought against the FBI. “The applicants argue that a stay is necessary to protect the First Amendment speech and association rights of those planning to attend the YSA convention. Surveillance and other forms of monitoring, they claim, will chill free participation and debate, and may even discourage some from attending the convention altogether. Beyond this, the applicants allege that the FBI has admitted that its agents or informants intend to participate in the convention debate posing as bona fide YSA members.2 This 'double agent' activity, the applicants claim, will result in the “corruption of the democratic process” and consequent irreparable harm to the applicants and others who would participate in the convention.<sup>1</sup>” Although the effect of FBI surveillance and participation in Communist party activities was apparent, the Supreme Court ruled in favor of the FBI. “In weighing the nature of the planned investigative activity, the justification for that activity, and the claimed First Amendment infringement in this case, the Court of Appeals determined that the balance of the equities tipped in favor of the Government and that a preliminary injunction was therefore improper.3” This case demonstrates an example of the “chilling effect” as a result of FBI surveillance, while also showing these tactics and related effects on free speech being condoned by the U.S. government. In recent years the “chilling effect” has taken on a much larger role in American society, not only through increased government surveillance deterring political participation, but through a broad range of social functions as well. Simple examples will show that social internet networks such as MySpace.com and The Facebook are having detrimental effects to people’s willingness to present information about themselves or their views. Some users of these networks have lost jobs or have been forced to censor what they publish in fear of what ramifications it may have on their job status or future wellbeing. In January, an undisclosed number of student-athletes were dismissed from the University of Colorado track team after posting indecent pictures of themselves on Facebook.4 The enormous amount of voluntary and involuntary personal information that can be tracked and monitored in today’s information age is causing people to give into the “chilling effect” in both political and social arenas. In all aspects of life, citizens of the U.S. are trying to fit the surveillance system rather than try to change or influence it. Once the people give into the system and refuse to participate or rebel out of fear of self incrimination then all hope of social progress is lost. Current Climate in the U.S. The government has the ultimate responsibility of procuring the safety of its citizens and upholding the values this country was founded upon. The argument we intend to layout is that while the government is concerned with the cease of any social and political change in opposition to its current agenda, this also inhibits the chance of further positive social and political climate change. Through certain tactics and surveillance, our government has the power to halt any social change while it is still in the ideological phase. The following points are composed of recent and post-9/1 1 incidents and programs the Bush administration has partaken in: Recently, the FBI admitted to surveilling mosques in nine cities nationwide, along with acknowledgement of keeping certain individuals of Muslim-descent (in the U.S.) under extreme surveillance. Agents have defended the programs, claiming certain mosques have provided them with lists of members5; The government is currently seeking to revamp its entire surveillance initiative, revising the process of getting warrants from the secretive Foreign National Surveillance Act (FISA) court to investigate suspected terrorists, spies, and other national security threats. The administration also wants new provisions in place to ease surveillance of people suspected of spreading weapons of mass destruction internationally. Among other tools available now: the government can break into homes, hotel rooms and cars to install hidden cameras and devices, as well as search drawers, luggage, or computer hard drives6; It has been revealed that the FBI used ‘national-security letters’ to scrutinize the financial and travel data, as well as telephone logs of thousands of U.S. citizens and residents. In March, a U.S. Justice Department report detailed the “widespread and serious misuse” of these letters since the inception of the Patriot Act. Between 2003 and 2005, the FBI issued more than 140,000 national-security letters, many of which involved people with no obvious ties to terrorism7; In 2006, it was revealed that President Bush signed a secret order in 2002 which authorized the National Security Agency (NSA) to eavesdrop on U.S. citizens and foreign nationals within the United States – despite past legal prohibitions against similar domestic spying. The NSA has monitored the e-mail, phones, and other communications of thousands of individuals without warrants8; In 2004, the Justice Department subpoenaed records from colleges and universities around the country relating to peaceful on-campus meetings between local anti-war activists and scholars5; In 2004, a University of Arizona sophomore was forbidden to attend a Social Security forum with President Bush due to a t-shirt that read, “Don’t be a smart [image of a donkey, the Democratic Party symbol]. UA Democrats.” The young man returned to the event with a different shirt yet was still refused entry as he had been placed on a list of people banned from the event and labeled as a “potential risk9”; In 2003, the New York City Police Department questioned multiple arrestees who had been detained at anti-war demonstrations. Various types of information were stored in a government database; Also in 2003, media reports surfaced accusing the FBI of collecting extensive information on the anti-war movement in search of “extremists”; Chicago Police infiltrated five protest groups in early 2002. Information pertaining to the case has been limited, along with that regarding the known surveillance tactics which were used5. Hunting down and weeding out individuals who disagree with the current administrative policy has become familiar practice. In an issue closer to home, Colorado GOP staffers ejected three people from a taxpayerfunded town hall meeting in 2005 that George W. Bush was attending in Denver, under the belief that they may be protesting. The three individuals were thrown out for behaving suspiciously while at their vehicle, which had a bumper sticker stating, “No More Blood For Oil.” The White House has refused to comment on the situation due to pending investigations. Two of the individuals who were thrown out, Leslie Weise and Alex Young, have filed a federal lawsuit against the GOP committee because they claim they were told to leave “because of their political views and that the White House had a policy of ejecting dissenters from the president’s appearance10.” It was later revealed that the men who approached these three individuals were wearing an earpieces and wires, navy blue suits and lapels similar to that or Secret Service agents. The Secret Service denied that their agents were involved in the ejection – they claimed the Republican host committee forced them out9. Whether these individuals were targeted by government agents or local GOP members is irrelevant. These citizens did not interrupt the event and certainly did no break any rules or laws by having an anti-war bumper sticker on their vehicle. This incident, among the many others presented, represent the strong hand our government yields in mandating its current agenda and status quo. To comprehend such acts of the present day, one must understand the history and ethical implications that are deeply rooted behind government-run surveillance. In the following pages, we will discuss the many events, programs, and key figures that have built and led government infiltration to where it stands today. “Those who sacrifice freedom for liberty deserve neither” -- Benjamin Franklin11 The J. Edgar Hoover Era John Edgar Hoover (born: January 1, 1895; deceased: May 2, 1972) was the director and founder of the U.S. Federal Bureau of Investigation (FBI). He remained director for nearly five decades and until his death at the age of 77. During his tenure, Hoover was highly regarded by the U.S. public as a prominent figure in American democracy. Only in the years since his death, many allegations have surfaced and tarnished his image. His career endured eight different presidential administrations, including the Great Depression, World War II, the Korean War, the Cold War, and Vietnam. It is because of Hoover's long and controversial reign that FBI directors are now limited to ten-year terms. Hoover has frequently been charged with exceeding and abusing his position of authority. He was known to have investigated groups and certain individuals due to their political beliefs rather than suspected criminal activity. The FBI first conducted extralegal activities such as burglaries and illegal wiretaps under his command. In 1956, Hoover was becoming increasingly frustrated by Supreme Court decisions that limited the Justice Department's ability to prosecute Communists. At this time he formalized a covert "dirty tricks" program under the name COINTELPRO, or Counter Intelligence Program. COINTELPRO was a program operated by the U.S. Federal Bureau of Investigation with the intent to investigate and destroy organizations that were considered to have politically radical elements. While covert operations were incorporated throughout the FBI history, COINTELPRO is known to have been most active from 1956-1971, targeting non-violent civil rights groups such as Martin Luther King and the Southern Christian Leadership Conference (SCLC). Other leftist political movements that were infiltrated include, most notably, the Black Panther Party (BPP) and the American Indian Movement (AIM), among others12. The main goal of COINTELPRO was to “expose, disrupt, misdirect, discredit, or otherwise neutralize” the activities of these groups and their leaders. Some of the main components of COINTELPRO included infiltration, psychological warfare from the outside, harassment through the legal system, along with extralegal force and violence. The FBI also incorporated “black bag jobs” into the program, which were warrant-less entries targeted against certain groups, most notably the BPP. The program remained top secret until a burglary by a group of left-wing radicals in 1971. The Citizens’ Commission to Investigate the FBI uncovered and removed several thousand files and passed them on to news agencies with the intentions to have them published. Many refused to publish the information and within months, Director Hoover declared that COINTELPRO was over and that future operations would be handled on a case-by-case and need-to-know basis13. In 1976, a major investigation into COINTELPRO was undertaken by the Select Committee to Study Governmental Operations with Respect to Intelligence Activities of the U.S. Senate, which was commonly referred to as the “Church Committee” due to its chairman, Senator Frank Church of Idaho. This Committee documented the entire history of the FBI being used for the purpose of political repression – dating as far back as World War I, when they were accountable for gathering ‘anarchists and revolutionaries’ for deportation – and building from the mid 1930s up until 1976. In a Final Report to the Select Committee, COINTELPRO was reprimanded with no uncertain charges: "Many of the techniques used would be intolerable in a democratic society even if all of the targets had been involved in violent activity, but COINTELPRO went far beyond that.. .the Bureau conducted a sophisticated vigilante operation aimed squarely at preventing the exercise of First Amendment rights of speech and association, on the theory that preventing the growth of dangerous groups and the propagation of dangerous ideas would protect the national security and deter violence13.” To this day, millions of documents remain unreleased and many of the released documents are entirely censored by the government. A Further Look into COINTELPRO After COINTELPRO was implemented to monitor the Communist Party in the U.S., Hoover decided to use these operations to investigate his concern that the Communist Party had infiltrated Black political organizations. This began an investigation on Black civil rights leader Dr. Martin Luther King, Jr. FBI surveillance of King began in 1957 and became more involved as his civil rights activities expanded and gained supporters, including an increasing number of agents assigned to monitor and disrupt the movement. By the end of 1963 COINTELPRO had expanded to cover Black activities and was known as the Black Hate COINTELPRO. During this time the FBI was monitoring not just King, but the Congress of Racial Equality, the Student Non-violent Coordinating Committee, the NAACP, and a number of other groups14. However, King was targeted as a main threat and was the focus of much investigation. In January 1963 Hoover wrote several memos which stated that King was associating with communists, and by the following spring was officially listed as a communist in the FBI Reserve Index. In October 1963, Attorney General Robert F. Kennedy approved the use of wiretaps against King, in addition to the hidden microphone surveillance that was also being used without Kennedy’s approval. These tactics were used for almost two years and were expanded to monitor King even more intensely. Stating that it was a “matter of national security” the FBI was allowed to place taps in the King home, the headquarters of the Southern Christian Leadership Conference in Atlanta and New York, as well as motel rooms in L.A., Atlantic City, Washington, D.C., Milwaukee, Honolulu, Detroit, Sacramento, and Savannah14. In a document written by FBI counterintelligence specialist Charles D. Brennan in September 1963, the reason for the measures of surveillance taken was that the amount of support the civil rights movement had gained over the past five years made it a clear threat to “the established order” of the U.S15. The surveillance was sanctioned for the sole purpose of determining how King had connections with the Communist Party USA; however, the information that was attained was used by the FBI to try to discredit him through a series of defamation attacks. The FBI monitored roughly five thousand of King’s phone calls over the years, but the surveillance revealed nothing about national security or communist infiltration. In 1964 the FBI made a composite tape of recordings from different hotel rooms that allegedly contained information about King’s sexual affairs. The tape was sanitized so as not to be traced back to the FBI, and was sent to King’s wife along with a note stating that the tape would not be made public if King committed suicide14. Around the same time period, other political groups were being investigated by the FBI in ongoing counterintelligence efforts. The Bureau began surveillance on the Nation of Islam and their leader, Elijah Muhammad. This surveillance was warranted because the FBI said that Nation of Islam members “disavow allegiance to the United States” and “are taught not to obey the laws of the United States.” Wiretap surveillance on Muhammad’s home in Chicago began in 1957, and when he purchased a home in Arizona in 1961, multiple wiretaps and microphones were installed there14. Malcolm X was one of the principle lieutenants of the Nation of Islam, but broke away in March of 1964 to establish a separate church called the Muslim Mosque, Inc., as well as a political Black organization called the Organization of Afro-American Unity. When this occurred the FBI became concerned about alliances between these groups and other influential groups. They undertook COINTELPRO actions to try to block alliances with white radical groups such as the Socialist Workers Party. At least 2,300 pages of material had been collected on him at the time of his assassination in February 1965. His assassination was stated to have been committed by former colleagues as a result of his splitting from the Nation of Islam. However in a memo written in 1969 the Chicago SAC stated that this factionalism had “been developed” by the FBI in hopes of squashing the movement. Four days after the assassination of Malcolm X, the FBI removed him from their security index. No one has ever been held legally responsible for the assassination, but one FBI agent wrote that he considered the murder to be a model for successful counterintelligence operations15. Ethical Frameworks Under utilitarian, duty-based, and rights-based ethical theories the act of heavy government surveillance policy is an ethical violation. From a utilitarian perspective, one must look at the consequences of an action, and determine which consequence would be the most desirable for the greatest number of people involved. In this case, the government is not acting in line with what is the greatest good for the greatest number. The greatest good is allowing a society to have the ability to freely participate and change the system in order to adhere to what is best for the people. By limiting radical political groups the government can effectively take away this ability. In taking the ability to change and progress away from the people in a democratic system the government violates the greatest good for the greatest number. The use of government surveillance to hinder radical movements is causing a “chilling effect” on political participation and results in an obstruction of social progress. The consequences of these government actions are undesirable, the actions are considered to be unethical under utilitarian or consequence-based theory. The duty-based and rights-based theories also show extreme surveillance to be an ethical violation. From a duty-based, or deontological perspective, heavy government surveillance is an ethical violation because it does not treat people in a universal or impartial way. Immanuel Kant, one of the most famous and influential deontological theorists, claimed that actions are unethical if they conflict with the idea that all people are free and rational beings. He stated that everyone has a duty to stop such unethical acts and promote freedom and rationality. Furthermore he stated that rules should only be applied if they are universal and impartial. Acts of government surveillance are often carried out with heavy biases against certain types of groups and ideologies, such as the civil rights or communist groups. In addition, using surveillance tactics against certain groups and individuals goes against the idea that people are free and capable of making their own decisions, and implies that people need to be monitored and controlled. Certain types of monitoring and controlling are necessary in any society, but in a democratic society when the control tactics goes as far to limit the effect the people can have on their own society then the system is not only undemocratic ,but unethical as well. The surveillance bias towards particular groups also violates several rules and regulations stated in our countries legal doctrines. Rights-based theory states that an action is unethical if it goes against rights that have been given through contract or law. Surveillance practices of the FBI and other government groups have shown to violate several laws and the rights that have been given to citizens by the government, such as freedom of speech, freedom of assembly, protection against illegal searches, and many more. In order to be ethical under a rights-based theory a democratic government must follow the laws and regulations set forth by the people’s elected government agents. Past and present government surveillance tactics violate these principles and are therefore unethical. “One does not establish a dictatorship in order to safeguard a revolution; one makes a revolution in order to establish a dictatorship.” -- George Orwell16 Legal Implications Our democratic system is built on the people’s participation in politics. This participation is most commonly practiced by voting in government elections and identifying with a major political party. Although these types of political participation are the most practiced and socially accepted they are not the only form of participation the system is built on. As outlined in Amendment I of the U.S. Constitution Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances17. Based on these laws the people of our country can speak out, challenge, and criticize the government as they see fit without fear of persecution. The theory behind this system is to allow for free and unaltered participation in the government by the people so that the laws and discourse of the country reflect that of the people’s beliefs. For this legal system to function properly the free participation of the people must be protected. Although our society generally chooses to believe this to be true, U.S. historical evidence shows the contrary. Each radical social movement in the U.S. has posed a general threat to the government administration of that time. From a present day perspective some of these movements brought about positive social change. Aside from the moral value of each radical movement, the government agencies of their times determine what to be in the best interest of the country and exude enormous surveillance and propaganda tactics for or against them. At the time of the civil rights movements the FBI classified pro-black groups as threats to national security. Despite these past classifications, these groups made a large positive impact on our countries values and laws. As a result of these “threats to national security” citizens of our country can now expect to be treated equally under the law and not endure unjust policies based on race. At the basis of all social change there is an opposition to the norm or majority. In the case of the civil rights movement the norm was a predominately racist society with national laws and regulations to perpetuate the racist system. Despite the efforts of government agencies to curb the radical groups and halt the social progress being made the people were able to assemble and cause radical reformations to take place in legal and social aspects of the country. It can be said that although the FBI and government tried to curb the Civil Rights movement the social change did occur and the theory of free political participation was upheld. Although it is true that the government ultimately failed in stopping the movement and societal change, they did not have the same technology that is available today. During the civil rights movement the FBI used basic surveillance technology including wire taps, bugged rooms, stake outs and propaganda. Today technology is advancing at a quicker rate than we can make use of it. The government now has technology and the access to information far greater than that of the 1960’s and can use it however they see fit. If not kept in check the government surveillance can lead to a system in which social change brought about by the people becomes impossible. Conclusion Demonstrated by the history in our country each government administration has used every resource they have in order to pursue the values and goals of their administration. As technology increases, so does the power of the government to monitor citizens, infiltrate groups, control information, and further push their view of what is best for the society. In an age of data mining, satellite surveillance, RFID chips, vast social networks, and an overall state of heightened security there is almost no limit to the capabilities of the government and its surveillance. We can assume based on historical facts that the government is currently monitoring to the best of their ability all radical groups in the country as well as the world. With current technology it’s also safe to assume that this surveillance and group monitoring is much more effective than in the past and could possibly end radical political influence before it starts. Coupled with increased technology there has been a decrease of freedom in our legal system with wartime laws such as the Patriot Act limiting fundamental rights and legal discourse outlined in the U.S. constitution. The system is moving away from free political participation and towards an information influenced police state. The U.S. legal system is based on change and adaptability. A historical example of this is the change in role the U.S. legal system took on in the nineteenth century. “An instrumental perspective of law did not simply emerge as a response to new economic forces in the nineteenth century. Rather, judges began to use law in order to encourage social change even in areas where they had previously refrained from doing so. It was not until the nineteenth century that the common law took on its innovating and transforming role in American society18.” Examples such as this show that the legal system has always played its part in influencing societal change since the early days of this country, but conversely the U.S. society members have also influenced changes to the legal system. The changes and innovation of U.S. law have consistently been influenced by social movements. The labor movements, civil rights movements, and feminist movements have all challenged the government of their time and as a result moved the U.S. towards a more equal and just society. As the power and technology of the government increases today so do the chances of any kind of societal change being halted. “Social movements are not distinct and self-contained; rather, they grow from and give birth to other movements, work in coalition with other movements, and influence each other indirectly through their effects on the larger cultural and political environment19.” If the government can monitor and stop one major movement they can influence and deter the masses from further radical ideology. In this lies the ethical violation. Under utilitarian, duty-based, and rights-based ethical theories the act of heavy government surveillance policy is an ethical violation. From a utilitarian perspective the government is not acting in line with what is the greatest good for the greatest number. The greatest good is allowing a society to have the ability to freely participate and change the system in order to adhere to what is best for the people. By limiting radical political groups the government can effectively take away this ability. In taking the ability to change and progress away from the people the government violates the greatest good for the greatest number. The duty-based and rights-based theories also show extreme surveillance to be an ethical violation. These theories examine how government surveillance is carried out and the ethical and legal violations that are inherent in the practices. From a duty-based perspective, heavy government surveillance is an ethical violation because it does not treat people in a universal or impartial way. It is often carried out with heavy biases against certain types of groups and ideologies. Not only is the surveillance bias towards particular groups but it also violates several rules and regulations stated in our countries legal doctrines. Surveillance practices of the FBI and other government groups have shown to violate several laws and the rights of the group participants. This type of surveillance discourse causes it to be an ethical violation. The democratic system needs free political participation and radical movements in order to progress. History has shown the positive effects radical groups have played in the progression of American society through out U.S. history. If the unethical practices of government surveillance are not kept in check into the future, the ideologies of freedom of speech and the power of the people will be lost forever. Case Extensions Educational Setting Key to Challenge Islamophobia Our advocacy is important in this space---interrogating Islamophobia in educational settings establishes a critical consciousness that enables larger political projects Housee 12, Senior Lecturer in Sociology [Jan. 04 2012, Shirin Housee works at the School of Humanities, Languages and Social Sciences, University of Wolverhampton, UK “What’s the point? Anti-racism and students’ voices against Islamophobia”, Volume 15, Issue 1] Having reflected on the two seminar sessions on Islamophobia and the student comments, I am convinced that the work of anti-racism in university classrooms is fundamentally important. As one student said racism is real. Through racism people suffer physically, psychologically, socially, educationally and politically. Our work in university classrooms is just the beginning of this challenge against racisms and other oppressions. Classroom discussions and general teaching form a very important contribution to this work of anti racism in education. There are no short cuts or painless cuts; the work of anti-racism is a difficult one. As educators we should make use of classroom exchanges; students’ engaged learning could be the key to promoting anti-racism in our class. My goal is to teach in a way that engages students and leads them to reflect on the socio-economic political/religions issues that surrounds theirs (our) lives. This article argues for making anti-racist thinking possible in class. The student voice, that critiques mainstream thinking as found in the media and elsewhere, is a starting point for this political work. I argue that teaching and learning in our classroom should encourage the critical consciousness necessary for pursuing social justice. Whilst I acknowledge the limits of doing anti-racist campaign in university spaces, I argue that this is a good starting point. And who knows, these educational exchanges may become (as with my own story) the awakening for bigger political projects against injustices in our society. In conclusion I endorse social justice advocates, such as Cunningham (cited in Johnson-Bailey 2002, 43) who suggest that educators re-direct classroom practices and the curriculum, because: ‘if we are not working for equity in our teaching and learning environments, then…educators are inadvertently maintaining the status quo.’ In conclusion I argue that a classroom where critical race exchanges and dialogues take place is a classroom where students and teachers can be transformed. Transformative social justice education calls on people to develop social, political and personal awareness of the damages of racism and other oppressions. I end by suggesting that in the current times of Islamophobic racism, when racist attacks are a daily occurrence, in August and September 2010 alone, nearly 30 people have been racially abused and physically attacked (Institute of Race Relations 2010). The point of studying racism, therefore, is to rise to the anti-racist challenge, and for me, a place to start this campaign is within Higher Education Institutions, optimistic as it might sound, I believe, as asserted by Sheridan (cited in Van Driel 2004) that: ‘Education can enlighten students and promote positive attitudes…. Education settings can be the first arena in which battles can be fought against Islamophobia. It is to education that our attention should be directed.’ (162) Interrogating Islamophobia => Transformative Pedagogy Deconstructing and interrogating flawed assumptions behind Islamophobia creates a transformative and liberatory pedagogy that enables us as agents to challenge racist dynamics Zine 4, Professor of Sociology and Equity Studies [2004, Jasmin Zine is a researcher studying Muslims in the Canadian diaspora. She teaches graduate courses in the Department of Sociology and Equity Studies in Education at the Ontario Institute for Studies in Education of the University of Toronto in the areas of race and ethnicity, anti-racism education and critical ethnography., “Anti-Islamophobia Education as Transformative Pedadogy: Reflections from the Educational Front Lines”, American Journal of Islamic Social Sciences 21:3] As an anti-racism scholar and educator, fellow colleagues and I realized from as early as September 12 that there was an urgency to frame a critical pedagogical response to address and challenge the rampant Islamophobia affecting the realities of Muslims from all walks of life and social conditions. Among the most vulnerable were children and youth, who received little support from schools in dealing with the backlash that many were experiencing on a routine basis. Most schools were reluctant to engage in any response beyond the politically neutral arena of “crisis management.” Among the school districts that I was in contact with, there was a clear resistance to addressing or even naming issues of racism and Islamophobia. In fact, the discursive language to name and define the experiences that Muslims were encountering on a day-to-day basis did not even exist within the educational discourse. While schools were reluctant to name specific incidents as racism – part of an all-too-common denial – the notion of “Islamophobia” did not have any currency at all. In fact, it was not a part of the language or conceptual constructs commonly used by educators, even by those committed to multicultural and antiracist pedagogy. I realized the urgency to map a new epistemological and pedagogical terrain by creating an educational framework for addressing Islamophobia. Within the existing equity-based educational frameworks, one could find the conceptual and pedagogical tools to address issues of racism, classism, sexism, homophobia, ableism, and anti-Semitism. However, the discursive foundations for dealing with Islamophobia and the accompanying educational resources simply did not exist. Developing a new framework to fill this gap involved coining a new term: “Anti-Islamophobia Education.” Being able to name and define the experience of Muslims as the result of Islamophobia was critical to shaping the kind of interventions that would take place from a critical educational standpoint. Before outlining a methodology for conducting anti-Islamophobia education, it was necessary to develop some discursive foundations, arrive at a definition of Islamophobia, and create an understanding of what it was that we sought to challenge and resist. From a socio-psychological standpoint, the notion of Islamophobia is often loosely translated as an “attitude of fear, mistrust, or hatred of Islam and its adherents.” However, this definition presents a narrow conceptual framework and does not take into account the social, structural, and ideological dimensions through which forms of oppression are operationalized and enacted. Applying a more holistic analysis, far from being based on mere “ignorance,” Islamophobic attitudes are, in fact, part of a rational system of power and domination that manifests as individual, ideological, and systemic forms of discrimination and oppression. The idea that discrimination, be it based on race, class, gender, sexuality, ability, or religion, simply stems from “ignorance” allows those engaged in oppressive acts and policies to claim a space of innocence. By labeling Islamophobia as an essentially “irrational” fear, this conception denies the logic and rationality of social dominance and oppression, which operates on multiple social, ideological, and systemic levels. Therefore, to capture the complex dimensions through which Islamophobia operates, it is necessary to extend the definition from its limited conception as a “fear and hatred of Islam and Muslims” and acknowledge that these attitudes are intrinsically linked to individual, ideological, and systemic forms of oppression that support the logic and rationale of specific power relations. For example, individual acts of oppression include such practices as name-calling or personal assault, while systemic forms of oppression refer to the structural conditions of inequality regulated through such institutional practices as racial profiling or denying jobs or housing opportunities. These exclusionary practices are shored up by specific ideological underpinnings, among them the purveyed notions designed to pathologize Muslims as “terrorists” and impending threats to public safety. Understanding the dimensions of how systems of oppression such as Islamophobia operate socially, ideologically, and systemically became a key component of developing educational tools that would help build the critical skills needed to analyze and challenge these dynamics. From a discursive standpoint, I locate anti-Islamophobia education within a integrative anti-racism framework5 that views systems of oppression based on race, class, gender, sexuality, ability, and religion as part of a multiple and interlocking nexus that reinforce and sustain one another. Based on this understanding, I have mapped some key epistemological foundations for anti-Islamophobia education.6 This includes the need to “reclaim the stage” through which Islam is represented from the specter of terrorists and suicide bombers to a platform of peace and social justice. “Reclaiming the stage” requires adopting a pedagogical approach that shifts the popular media discourse away from the negative, essentialized referents and tropes of abject “Otherness” ascribed to Muslims. This move involves presenting a critical counter-narrative in order to reframe the Manichean worldview and “clash of civilizations” narratives typically being purveyed in order to present a more nuanced, reasoned, and critical perspective of the global sociopolitical realities that Muslim individuals and societies are confronting, engaging, and challenging. Another foundational aspect of anti-Islamophobia education involves interrogating the systemic mechanisms through which Islamophobia is reinforced, by analytically unraveling the dynamics of power in society that sustain social inequality. Racial profiling, which targets groups on the basis of their race, ethnicity, faith, or other aspects of social difference, and similar issues are major systemic barriers that criminalize and pathologize entire communities. In schools, the practice of “color-coded streaming,” whereby a disproportionate number of racially and ethnically marginalized youth are channeled into lower non-academic level streams, is another example of institutionalized racism. Negative perceptions held by teachers and guidance counselors toward racialized students have often led to assumptions of failure or limited chances for success, based on such false stereotypes as the notion that “Islam doesn’t value education for girls” or “Black students won’t succeed.” These negative attitudes are relayed to students through the “hidden curriculum” of schooling and lead to lower expectations being placed upon youth from specific communities.7 Developing critical pedagogical tools to analyze and develop challenges to these systems of domination is part of building a transformative and liberatory pedagogy, one geared toward achieving greater social justice in both schools and society. Another key goal of anti-Islamophobia education involves the need to demystify stereotypes. Since 9/11, renewed Orientalist constructions of difference have permeated the representation of Muslims in media and popular culture. Images of fanatical terrorists and burqa-clad women are seen as the primary markers of the Muslim world. Deconstructing and demystifying these stereotypes is vital to helping students develop a critical literacy of the politics of media and image-making. Critically examining the destructive impact of how these images create the social and ideological divide between “us” and “them” is important to exposing how power operates through the politics of representation. Negative Solvency Note for Glennon / Circumvention Ev FYI --- “Trumanites” in the Glennon, 14 ev refers to: Glennon, 14 --- Professor of International Law at Tufts (Michael, Harvard National Security Journal, “National Security and Double Government,” http://harvardnsj.org/wpcontent/uploads/2014/01/Glennon-Final.pdf, JMP) President Harry S. Truman, more than any other President, is responsible for creating the nation’s “efficient” national security apparatus.99 Under him, Congress enacted the National Security Act of 1947, which unified the military under a new Secretary of Defense, set up the CIA, created the modern Joint Chiefs of Staff, and established the National Security Council (“NSC”).100 Truman also set up the National Security Agency, which was intended at the time to monitor communications abroad.101 Friends as well as detractors viewed Truman’s role as decisive.102 Honoring Truman’s founding role, this Article will substitute “Trumanite” for “efficient,” referring to the network of several hundred high-level military, intelligence, diplomatic, and law enforcement officials within the Executive Branch who are responsible for national security policymaking. 1nc Circumvention A network of national security officials actually determines policy --- enacting external checks just legitimates them without providing any constraint Glennon, 14 --- Professor of International Law at Tufts (Michael, Harvard National Security Journal, “National Security and Double Government,” http://harvardnsj.org/wpcontent/uploads/2014/01/Glennon-Final.pdf, JMP) VI. Conclusion U.S. national security policy has scarcely changed from the Bush to the Obama Administration. The theory of Walter Bagehot explains why. Bagehot described the emergence in 19th-century Britain of a “disguised republic” consisting of officials who actually exercised governmental power but remained unnoticed by the public, which continued to believe that visible, formal institutions exercised legal authority.601 Dual institutions of governance, one public and the other concealed, were referred to by Bagehot as “double government.”602 A similar process of bifurcated institutional evolution has occurred in the United States, but in reverse: a network has emerged within the federal government that exercises predominant power with respect to national security matters. It has evolved in response to structural incentives rather than invidious intent, and it consists of the several hundred executive officials who manage the military, intelligence, diplomatic, and law enforcement agencies responsible for protecting the nation’s security. These officials are as little disposed to stake out new policies as they are to abandon old ones. They define security more in military and intelligence terms rather than in political or diplomatic ones. Enough examples exist to persuade the public that the network is subject to judicial, legislative, and executive constraints. This appearance is important to its operation, for the network derives legitimacy from the ostensible authority of the public, constitutional branches of the government. The appearance of accountability is, however, largely an illusion fostered by those institutions’ pedigree, ritual, intelligibility, mystery, and superficial harmony with the network’s ambitions. The courts, Congress, and even the presidency in reality impose little constraint. Judicial review is negligible; congressional oversight dysfunctional; and presidential control nominal. Past efforts to revive these institutions have thus fallen flat. Future reform efforts are no more likely to succeed, relying as they must upon those same institutions to restore power to themselves by exercising the very power that they lack. External constraints— public opinion and the press—are insufficient to check it. Both are manipulable, and their vitality depends heavily upon the vigor of constitutionally established institutions, which would not have withered had those external constraints had real force. Nor is it likely that any such constraints can be restored through governmental efforts to inculcate greater civic virtue, which would ultimately concentrate power even further. Institutional restoration can come only from an energized body politic. The prevailing incentive structure, however, encourages the public to become less, not more, informed and engaged. Executive will just ignore Congress and FISA typically defers to it Bendix & Quirk, 15 --- *assistant professor of political science at Keene State College, AND **Phil Lind Chair in U.S. Politics and Representation at the University of British Columbia (March 2015, William Bendix and Paul J. Quirk, “Secrecy and negligence: How Congress lost control of domestic surveillance,” http://www.brookings.edu/~/media/research/files/papers/2015/03/02-secrecy-negligence-congressurveillance-bendix-quirk/ctibendixquirksecrecyv3.pdf, JMP) Even if Congress at some point enacted new restrictions on surveillance, the executive might ignore the law and continue to make policy unilaterally. The job of reviewing executive conduct would again fall to the FISA Court.56 In view of this court’s history of broad deference to the executive, Congress would have a challenge to ensure that legislative policies were faithfully implemented. Executive lawyers provides the means to circumvent the plan Shane, 12 --- Jacob E. Davis and Jacob E. Davis II Chair in Law, The Ohio State University Moritz School of Law (Peter M., Journal of National Security Law & Policy, “Executive Branch Self-Policing in Times of Crisis: The Challenges for Conscientious Legal Analysis,” 5 J. Nat'l Security L. & Pol'y 507)) II. The Breakdown of Government Lawyering The military and foreign policy disasters generated by presidential unilateralism demonstrate the practical importance of maintaining a pluralist view of checks and balances. Political officials are not simply rational actors who respond with dispassionate calculation to evidence and circumstance. Facts and options are always filtered through ideological prisms. Presidentialism narrows the prism. Pluralism works to offset that filtering. Pluralism guards against too much distortion by seeking to maximize the number of meaningful institutional voices in the policy making process. Equally troubling is the risk of presidentialism to the rule of law. Even in normal times, a heavy burden falls on government attorneys in virtually every agency. Government lawyering frequently represents the exclusive avenue through which the law is actually brought to bear on decisionmaking. This professional review within the executive branch is crucial. Most government decisions are simply too low in visibility, or too diffuse in impact, to elicit judicial review or congressional oversight as ways of monitoring legal compliance. Yet, the ideological prism of presidentialism can bend the light of the law so that nothing is seen other than the claimed prerogatives of the sitting chief executive. Champions of executive power - even skilled lawyers who should know better - wind up asserting that, to an extraordinary extent, the President as a matter of constitutional entitlement is simply not subject to legal regulation by either of the other two branches of government. [*511] Government attorneys must understand their unique roles as both advisers and advocates. In adversarial proceedings before courts of law, it may be fine for each of two contesting sides, including the government, to have a zealous, and not wholly impartial, presentation, with the judge acting as a neutral decisionmaker. But in their advisory function, government lawyers must play a more objective, even quasiadjudicative, role. They must give the law their most conscientious interpretation. If they fail in that task, frequently there will be no one else effectively situated to do the job of assuring diligence in legal compliance. Government lawyers imbued with the ideology of presidentialism too easily abandon their professional obligations as advisers and too readily become ethically blinkered advocates for unchecked executive power. Jack Goldsmith headed the Office of Legal Counsel (OLC) for a little less than ten months in 2003-2004. Of the work done by some government attorneys and top officials after 9/11, he said they dealt with FISA limitations on warrantless surveillance by the National Security Agency (NSA) "the way they dealt with other laws they didn't like: they blew through them in secret based on flimsy legal opinions that they guarded closely so no one could question the legal basis for the operations." n7 He describes a 2003 meeting with David Addington, who was Counsel and later Chief of Staff to Vice President Dick Cheney, in which Addington denied the NSA Inspector General's request to see a copy of OLC's legal analysis in support of the NSA surveillance program. Before Goldsmith arrived at OLC, "not even NSA lawyers were allowed to see the Justice Department's legal analysis of what NSA was doing." n8 OLC's analysis of the legality of NSA surveillance, issued on January 19, 2006, justified the program on two grounds: the President's inherent war powers and the Authorization for Use of Military Force (AUMF). However, the AUMF did not say anything about electronic surveillance. In 1978, Congress expressly stated that no statute other than the Foreign Intelligence Surveillance Act (FISA) or Title III - the law that applies to ordinary federal criminal prosecution - provides authority for electronic surveillance by the federal government. The AUMF could supersede FISA by repealing it, but only by making the repeal explicit. An argument that the AUMF implicitly repealed FISA necessarily falls short. OLC also argued that the President had an inherent constitutional power to conduct the NSA program no matter what FISA said. According to OLC, if FISA of 1978, as amended, were read to preclude the NSA program, the statute would be unconstitutional. n9 [*512] What prompted the Justice Department to argue in this fashion? One answer might be that Justice Department lawyers are institutionally expected to advocate for the President's powers and simply adopt the most ambitious arguments consistent with appropriate standards of professional competence in legal research and analysis. However, it is not the responsibility of Justice Department lawyers to advocate for every contemplated assertion of presidential authority, no matter how far-fetched. Even in my brief period at Justice, I witnessed multiple and significant examples of Department lawyers refusing to provide analytic support for legally ill-conceived proposals for executive action. Moreover, it is difficult to make a case for the professional competence of the FISA memorandum. Although the Justice Department manages to elaborate its views in over forty pages of single-spaced and highly technical verbiage, its memorandum never confronts the enormity of the initiative it is endorsing or the power of alternative arguments. Instead, it proffers distinctions from contrary precedents that are often, in a word, silly. Even if the authors felt institutionally constrained to reach a particular bottom line, the failure to assert any principle limiting the claims being made and the too-frequent lack of rhetorical judgment in structuring their argument suggest something other than diligent lawyering was at play. What accounted for the bad arguments was political and professional pressure. When I worked at Justice, the refusal to take positions that could not be defended by respectable standards did not harm the lawyer. As anyone who has ever worked in an organization knows, however, informal pressure can be an extraordinarily effective method of stifling disagreement and guiding decisions in the way top management desires. We know that supervision of the process of executive branch lawyering on the NSA memorandum was significantly usurped by the Office of the Vice President. David Addington, the Vice President's Counsel, and John Yoo, then a deputy in OLC, worked together to craft a series of arguments for unprecedented claims of executive power to pursue the campaign against terrorism. n10 Jack Goldsmith reports that Addington blackballed from future advancement in the executive branch any lawyer who dared cross swords with him. n11 The deficiencies of legal analysis of NSA surveillance were replicated in other initiatives after 9/11, including the treatment of persons captured and suspected of aiding and abetting terrorism. The Justice Department, through OLC, produced legal opinions stating, in effect, that anyone [*513] captured in the Afghanistan campaign had few, if any, rights under U.S. or international law and certainly no rights susceptible to vindication in U.S. courts. n12 The function of these legal opinions - indeed, their obvious purpose - was to ratify a scheme of maximum license to do with the detainees whatever the military, the CIA, or any other U.S. authority might choose to do with them. The Administration's lawyering process cleared the path to horrors at the Abu Ghraib prison and Guantanamo - crimes whose stain upon our national honor is likely to remain, for decades at least, firmly embedded in the world's collective memory, deeply undermining our image and influence abroad. It is understandable that the Administration would want some flexibility in dealing with a threat it rightly regarded as in some ways unprecedented and of very grave magnitude. And yet, to move the detainees so completely beyond the realm of normal legal process was itself a plainly risky strategy in terms of compromising international support, exposing U.S. military personnel to mistreatment, risking the honor of U.S. military culture, and weakening the fabric of international law generally in its protection of both combatants and civilians during wartime. The desire for flexibility was understandable, but not at the cost of all other values. On a number of the most important points discussed in the OLC lawyers' memoranda, the courts subsequently held them to be wrong. Contrary to OLC, the Supreme Court held that foreign detainees at Guantanamo who challenged their classification as enemy combatants were entitled to judicial review of the legality of their detention. n13 Contrary to OLC, the Court held that the Geneva Conventions protected the detainees, whether or not they strictly qualified as prisoners of war. n14 Contrary to OLC and Justice Department briefs, the Court held that the military commissions as originally constituted were not sufficiently protective of the detainees' rights to permit their use for war crimes trials. n15 On all of these questions, whether of morality, policy, or law, there were at least serious arguments to be entertained by both sides. The fact that the Administration reached incorrect conclusions is, in itself, only a limited indictment of its lawyering. Even good lawyers make mistakes, and the fact that executive branch lawyers would consistently make mistakes erring on the side of executive authority is not in itself damning. What is damning, however, is that on critical questions - questions going to the core of national honor and identity - executive branch lawyering was not just [*514] wrong, misguided, or ethically insensitive. It was incompetent. It was so sloppy, so one-sided, and at times so laughably unpersuasive that it cannot be defended as ethical lawyering in any context. Tax advice this bad would be malpractice. Government lawyering this bad should be grounds for discharge. --- 2nc Circumvention The plan can’t solve --- creates illusion of control that allows national security bureaucracy to flourish Glennon, 14 --- Professor of International Law at Tufts (Michael, Harvard National Security Journal, “National Security and Double Government,” http://harvardnsj.org/wpcontent/uploads/2014/01/Glennon-Final.pdf, JMP) V. Is Reform Possible? Checks, Smoke, and Mirrors Madison, as noted at the outset,543 believed that a constitution must not only set up a government that can control and protect the people, but, equally importantly, must protect the people from the government.544 Madison thus anticipated the enduring tradeoff: the lesser the threat from government, the lesser its capacity to protect against threats; the greater the government’s capacity to protect against threats, the greater the threat from the government. Recognition of the dystopic implications of double government focuses the mind, naturally, on possible legalist cures to the threats that double government presents. Potential remedies fall generally into two categories. First, strengthen systemic checks, either by reviving Madisonian institutions—by tweaking them about the edges to enhance their vitality— or by establishing restraints directly within the Trumanite network. Second, cultivate civic virtue within the electorate. A. Strengthening Systemic Checks The first set of potential remedies aspires to tone up Madisonian muscles one by one with ad hoc legislative and judicial reforms, by, say, narrowing the scope of the state secrets privilege; permitting the recipients of national security letters at least to make their receipt public; broadening standing requirements; improving congressional oversight of covert operations, including drone killings and cyber operations; or strengthening statutory constraints like FISA545 and the War Powers Resolution.546 Law reviews brim with such proposals. But their stopgap approach has been tried repeatedly since the Trumanite network’s emergence. Its futility is now glaring. Why such efforts would be any more fruitful in the future is hard to understand. The Trumanites are committed to the rule of law and their sincerity is not in doubt, but the rule of law to which they are committed is largely devoid of meaningful constraints.547 Continued focus on legalist band-aids merely buttresses the illusion that the Madisonian institutions are alive and well—and with that illusion, an entire narrative premised on the assumption that it is merely a matter of identifying a solution and looking to the Madisonian institutions to effect it. That frame deflects attention from the underlying malady. What is needed, if Bagehot’s theory is correct, is a fundamental change in the very discourse within which U.S. national security policy is made. For the question is no longer: What should the government do? The questions now are: What should be done about the government? What can be done about the government? What are the responsibilities not of the government but of the people? --- 2nc Turns the Case Reform attempts just provide a veneer of legitimacy for national security officials to continue making decisions to perpetuate their existence Glennon, 14 --- Professor of International Law at Tufts (Michael, Harvard National Security Journal, “National Security and Double Government,” http://harvardnsj.org/wpcontent/uploads/2014/01/Glennon-Final.pdf, JMP) Nonetheless, in the United States today, as in Bagehot’s Britain, “[m]ost do indeed vaguely know that there are some other institutions”239 involved in governance besides those established by the Constitution. But the popular conception of an “invisible government,” “state within,” or “national security state” is off the mark. The existence of the Trumanite network is no secret. The network’s emergence has not been the result of an enormous, nefarious conspiracy conceived to displace constitutional government. The emergence of the Trumanite network has not been purposeful. America’s dual national security framework has evolved gradually in response to incentives woven into the system’s structure as that structure has reacted to society’s felt needs. Yet, as a whole, Americans still do not recognize the extent to which Madisonian institutions have come to formulate national security policy in form more than in substance. One reason that they do not is that the double government system has exceptions. For the dual institutional structure to work, it is crucial, Bagehot believed, to “hide where the one begins and where the other ends.”240 Overlap is required. Enough counterexamples must exist to persuade an optimistic public that the reason for policy continuity is human, not systemic. Thus, the counterexamples must be sufficient for the public to believe that if they elect different people then policy will change, giving credence to the idea that the real institutions have not lost all power in making national security policy. Similarly, the Trumanites often include some quasi-Madisonian officers, such as the Secretaries of State and Defense, who themselves generate deference through the same theatrical show common to the Madisonian institutions. Congress, the President, and the courts do sometimes say no to the Trumanites. But they do not do so often enough to endanger double government. The Trumanite network makes American national security policy; it is occasional exceptions to that policy that are made by the Madisonian institutions. It is a unique turn --- Madisonians’ role is decreasing now which risks exposing the illusion of double government Glennon, 14 --- Professor of International Law at Tufts (Michael, Harvard National Security Journal, “National Security and Double Government,” http://harvardnsj.org/wpcontent/uploads/2014/01/Glennon-Final.pdf, JMP) E. Implications for the Future The aim of this Article thus far has been to explain the continuity in U.S. national security policy. An all-tooplausible answer, this Article has suggested, lies in Bagehot’s concept of double government. Bagehot believed that double government could survive only so long as the general public remains sufficiently credulous to accept the superficial appearance of accountability, and only so long as the concealed and public elements of the government are able to mask their duality and thereby sustain public deference.501 As evidence of duality becomes plainer and public skepticism grows, however, Bagehot believed that the cone of governance will be “balanced on its point.”502 If “you push it ever so little, it will depart farther and farther from its position and fall to earth.”503 If Bagehot’s theory is correct, the United States now confronts a precarious situation. Maintaining the appearance that Madisonian institutions control the course of national security policy requires that those institutions play a large enough role in the decision-making process to maintain the illusion. But the Madisonians’ role is too visibly shrinking, and the Trumanites’ too visibly expanding, to maintain the plausible impression of Madisonian governance.504 For this reason and others, public confidence in the Madisonians has sunk to new lows.505 The Trumanites have resisted transparency far more successfully than have the Madisonians, with unsurprising results. The success of the whole dual institutional model depends upon the maintenance of public enchantment with the dignified/ Madisonian institutions. This requires allowing no daylight to spoil their magic,506 as Bagehot put it. An element of mystery must be preserved to excite public imagination. But transparency—driven hugely by modern internet technology, multiple informational sources, and social media— leaves little to the imagination. “The cure for admiring the House of Lords,” Bagehot observed, “was to go and look at it.”507 The public has gone and looked at Congress, the Supreme Court, and the President, and their standing in public opinion surveys is the result. Justices, senators, and presidents are not masters of the universe after all, the public has discovered. They are just like us. Enquiring minds may not have read enough of Foreign Affairs508 to assess the Trumanites’ national security polices, but they have read enough of People Magazine509 to know that the Madisonians are not who they pretend to be. While the public’s unfamiliarity with national security matters has no doubt hastened the Trumanites’ rise, too many people will soon be too savvy to be misled by the Madisonian veneer,510 and those people often are opinion leaders whose influence on public opinion is disproportionate to their numbers. There is no point in telling ghost stories, Holmes said, if people do not believe in ghosts.511 --- XT: National Security Officials = Circumvention No solvency --- executive officials control national security policy and will circumvent Glennon, 14 --- Professor of International Law at Tufts (Michael, Harvard National Security Journal, “National Security and Double Government,” http://harvardnsj.org/wpcontent/uploads/2014/01/Glennon-Final.pdf, JMP) Abstract National security policy in the United States has remained largely constant from the Bush Administration to the Obama Administration. This continuity can be explained by the “double government” theory of 19thcentury scholar of the English Constitution Walter Bagehot. As applied to the United States, Bagehot’s theory suggests that U.S. national security policy is defined by the network of executive officials who manage the departments and agencies responsible for protecting U.S. national security and who, responding to structural incentives embedded in the U.S. political system, operate largely removed from public view and from constitutional constraints. The public believes that the constitutionally-established institutions control national security policy, but that view is mistaken. Judicial review is negligible; congressional oversight is dysfunctional; and presidential control is nominal. Absent a more informed and engaged electorate, little possibility exists for restoring accountability in the formulation and execution of national security policy. Entrenched national security officials ensure circumvention Glennon, 14 --- Professor of International Law at Tufts (Michael, Harvard National Security Journal, “National Security and Double Government,” http://harvardnsj.org/wpcontent/uploads/2014/01/Glennon-Final.pdf, JMP) Introduction Few who follow world events can doubt that the Obama Administration’s approach to multiple national security issues has been essentially the same as that of the Bush Administration.2 The Obama Administration, like its predecessor, has sent terrorism suspects overseas for detention and interrogation;3 claimed the power to hold, without trial, American citizens who are accused of terrorism in military confinement;4 insisted that it is for the President to decide whether an accused terrorist will be tried by a civilian court or a military tribunal;5 kept the military prison at Guantánamo Bay open,6 argued that detainees cannot challenge the conditions of their confinement,7 and restricted detainees’ access to legal counsel;8 resisted efforts to extend the right of habeas corpus to other offshore prisons;9 argued that detainees cannot invoke the Geneva Conventions in habeas proceedings;10 denied detainees access to the International Committee of the Red Cross for weeks at a time;11 engaged the United States in a military attack against Libya without congressional approval, in the face of no actual or imminent threat to the nation;12 and continued, and in some respects expanded, the Bush Administration’s ballistic missile defense program.13 The Obama Administration, beyond ending torture, has changed “virtually none” of the Bush Administration’s Central Intelligence Agency (“CIA”) programs and operations,14 except that in continuing targeted killings, the Obama Administration has increased the number of covert drone strikes in Pakistan to six times the number launched during the Bush Administration.15 The Obama Administration has declined to prosecute those who committed torture (after the President himself concluded that waterboarding is torture);16 approved the targeted killing of American citizens (Anwar al-Awlaqi and a compatriot17) without judicial warrant;18 rejected efforts by the press and Congress to release legal opinions justifying those killings or describing the breadth of the claimed power;19 and opposed legislative proposals to expand intelligence oversight notification requirements.20 His administration has increased the role of covert special operations,21 continuing each of the covert action programs that President Bush handed down.22 The Obama Administration has continued the Bush Administration’s cyberwar against Iran (code-named “Olympic Games”)23 and sought to block lawsuits challenging the legality of other national security measures,24 often claiming the state secrets privilege.25 The Obama Administration has also continued, and in some ways expanded, Bush-era surveillance policies. For example, the Obama Administration continued to intercept the communications of foreign leaders; 26 further insisted that GPS devices may be used to keep track of certain citizens without probable cause or judicial review27 (until the Supreme Court disapproved28); continued to investigate individuals and groups under Justice Department guidelines re-written in 2008 to permit “assessments” that require no “factual basis” for FBI agents to conduct secret interviews, plant informants, and search government and commercial databases;29 stepped up the prosecution of government whistleblowers who uncovered illegal actions,30 using the 1917 Espionage Act eight times during his first administration to prosecute leakers (it had been so used only three times in the previous ninety-two years);31 demanded that businesses turn over personal information about customers in response to “national security letters” that require no probable cause and cannot legally be disclosed;32 continued broad National Security Agency (“NSA”) homeland surveillance;33 seized two months of phone records of reporters and editors of the Associated Press for more than twenty telephone lines of its offices and journalists, including their home phones and cellphones, without notice;34 through the NSA, collected the telephone records of millions of Verizon customers, within the United States and between the United States and other countries, on an “ongoing, daily basis” under an order that prohibited Verizon from revealing the operation;35 and tapped into the central servers of nine leading U.S. internet companies, extracting audio and video chats, photographs, emails, documents, and connection logs that enable analysts to track foreign targets and U.S. citizens.36 At least one significant NSA surveillance program, involving the collection of data on the social connections of U.S. citizens and others located within the United States, was initiated after the Bush Administration left office.37 These and related policies were formulated and carried out by numerous high- and mid-level national security officials who served in the Bush Administration and continued to serve in the Obama Administration.38 Given Senator Obama’s powerful criticism of such policies before he took office as President, the question,39 then, is this: Why does national security policy remain constant even when one President is replaced by another who as a candidate repeatedly, forcefully, and eloquently promised fundamental changes in that policy? The affirmative focuses on the wrong area of government --- U.S. national security decisions are made by executive officials, separate from even the President. Glennon, 14 --- Professor of International Law at Tufts (Michael, Harvard National Security Journal, “National Security and Double Government,” http://harvardnsj.org/wpcontent/uploads/2014/01/Glennon-Final.pdf, JMP) As it did in the early days of Britain’s monarchy, power in the United States lay initially in one set of institutions—the President, Congress, and the courts. These are America’s “dignified” institutions. Later, however, a second institution emerged to safeguard the nation’s security. This, America’s “efficient” institution (actually, as will be seen, more a network than an institution) consists of the several hundred executive officials who sit atop the military, intelligence, diplomatic, and law enforcement departments and agencies that have as their mission the protection of America’s international and internal security. Large segments of the public continue to believe that America’s constitutionally established, dignified institutions are the locus of governmental power; by promoting that impression, both sets of institutions maintain public support. But when it comes to defining and protecting national security, the public’s impression is mistaken. America’s efficient institution makes most of the key decisions concerning national security, removed from public view and from the constitutional restrictions that check America’s dignified institutions. The United States has, in short, moved beyond a mere imperial presidency to a bifurcated system—a structure of double government—in which even the President now exercises little substantive control over the overall direction of U.S. national security policy. Whereas Britain’s dual institutions evolved towards a concealed republic, America’s have evolved in the opposite direction, toward greater centralization, less accountability, and emergent autocracy. --- XT: FBI Circumvents FBI surveillance continues even after restrictions on its activities Fisher, 4 --- Associate Professor of Law and Director, Center for Social Justice, Seton Hall Law School (Winter 2004, Linda E., Arizona Law Review, “Guilt by Expressive Association: Political Profiling, Surveillance and the Privacy of Groups,” 46 Ariz. L. Rev. 621, Lexis, JMP) The history of the FBI and other law enforcement surveillance gives scant comfort to those engaged in lawful political and religious activities who are [*623] concerned about becoming targets of surveillance. n5 From its inception until restrictions on its activities were imposed in the mid-1970s - and even sometimes thereafter - the FBI regularly conducted politically motivated surveillance, choosing targets based on their political or religious beliefs. As part of its investigations, it compiled and widely disseminated political dossiers, engaged in warrantless searches, and disrupted the lawful First Amendment activities of a wide array of groups opposed to government policy. n6 Local police "Red Squads" did the same. n7 During the war in Vietnam, the CIA, despite restriction of its mission to foreign intelligence, also conducted domestic surveillance operations. n8 Religious groups engaged in political activity were among the targets of intelligence agency investigations. n9 --- XT: NSA Circumvents Yes circumvention --- recent NSA action proves Ackerman, 15 --- American national security reporter and blogger, national security editor for the Guardian (6/1/2015, Spencer, The Guardian, “Fears NSA will seek to undermine surveillance reform; Privacy advocates are wary of covert legal acrobatics from the NSA similar to those deployed post-9/11 to circumvent congressional authority,” Lexis, JMP) Privacy advocates fear the National Security Agency will attempt to weaken new restrictions on the bulk collection of Americans' phone and email records with a barrage of creative legal wrangles, as the first major reform of US surveillance powers in a generation looked likely to be a foregone conclusion on Monday. Related: Bush-era surveillance powers expire as US prepares to roll back NSA power The USA Freedom Act, a bill banning the NSA from collecting US phone data in bulk and compelling disclosure of any novel legal arguments for widespread surveillance before a secret court, has already been passed by the House of Representatives and on Sunday night the Senate voted 77 to 17 to proceed to debate on it. Between that bill and a landmark recent ruling from a federal appeals court that rejected a longstanding government justification for bulk surveillance, civil libertarians think they stand a chance at stopping attempts by intelligence lawyers to undermine reform in secret. Attorneys for the intelligence agencies react scornfully to the suggestion that they will stretch their authorities to the breaking point. Yet reformers remember that such legal tactics during the George W Bush administration allowed the NSA to shoehorn bulk phone records collection into the Patriot Act. Rand Paul, the Kentucky senator and Republican presidential candidate who was key to allowing sweeping US surveillance powers to lapse on Sunday night, warned that NSA lawyers would now make mincemeat of the USA Freedom Act's prohibitions on bulk phone records collection by taking an expansive view of the bill's definitions, thanks to a pliant, secret surveillance court. "My fear, though, is that the people who interpret this work at a place known as the rubber stamp factory, the Fisa [court]," Paul said on the Senate floor on Sunday. Paul's Democratic ally, Senator Ron Wyden, warned the intelligence agencies and the Obama administration against attempting to unravel NSA reform. "My time on the intelligence committee has taught me to always be vigilant for secret interpretations of the law and new surveillance techniques that Congress doesn't know about," Wyden, a member of the intelligence committee, told the Guardian. "Americans were rightly outraged when they learned that US intelligence agencies relied on secret law to monitor millions of law-abiding US citizens. The American people are now on high alert for new secret interpretations of the law, and intelligence agencies and the Justice Department would do well to keep that lesson in mind." The USA Freedom Act is supposed to prevent what Wyden calls " secret law ". It contains a provision requiring congressional notification in the event of a novel legal interpretation presented to the secret Fisa court overseeing surveillance. Yet in recent memory, the US government permitted the NSA to circumvent the Fisa court entirely. Not a single Fisa court judge was aware of Stellar Wind, the NSA's post-9/11 constellation of bulk surveillance programs, from 2001 to 2004. Energetic legal tactics followed to fit the programs under existing legal authorities after internal controversy or outright exposure. When the continuation of a bulk domestic internet metadata collection program risked the mass resignation of Justice Department officials in 2004, an internal NSA draft history records that attorneys found a different legal rationale that " essentially gave NSA the same authority to collect bulk internet metadata that it had ". After a New York Times story in 2005 revealed the existence of the bulk domestic phone records program, attorneys for the US Justice Department and NSA argued, with the blessing of the Fisa court, that Section 215 of the Patriot Act authorized it all along - precisely the contention that the second circuit court of appeals rejected in May. --- XT: CIA Circumvents CIA controls policy --- it empirically lies and gets what it wants Glennon, 14 --- Professor of International Law at Tufts (Michael, Harvard National Security Journal, “National Security and Double Government,” http://harvardnsj.org/wpcontent/uploads/2014/01/Glennon-Final.pdf, JMP) Justice Douglas, a family friend of the Kennedys, saw the Trumanites’ influence first-hand: “In reflecting on Jack’s relation to the generals, I slowly realized that the military were so strong in our society that probably no President could stand against them.”375 As the roles of the generals and CIA have converged, the CIA’s influence has expanded—aided in part by a willingness to shade the facts, even with sympathetic Madisonian sponsors. A classified, 6,000-word report by the Senate Intelligence Committee reportedly concluded that the CIA was “so intent on justifying extreme interrogation techniques that it blatantly misled President George W. Bush, the White House, the Justice Department and the Congressional intelligence committees about the efficacy of its methods.”376 “The CIA gets what it wants,” President Obama told his advisers when the CIA asked for authority to expand its drone program and launch new paramilitary operations.377 CIA fights any restraints --- comes after legislators that try and reign it in Friedersdorf, 14 (Conor, 3/20/2014, “Nancy Pelosi: When Legislators Take on the CIA, 'They Come After You'; A powerful legislator on the costs of properly overseeing the intelligence community,” http://www.theatlantic.com/politics/archive/2014/03/nancy-pelosi-when-legislators-take-on-the-cia-theycome-after-you/284524/, JMP) House Minority Leader Nancy Pelosi's remarks in support of fellow legislator Dianne Feinstein, who is embroiled in a dispute with the CIA, ought to be the sort of thing that alarms everyone. After all, another powerful member of Congress claims that the spy agency she is charged with overseeing illegitimately resists checks on its autonomy. Here's how she put it: "I salute Senator Feinstein. I tell you, you take on the intelligence community, you're a person of courage. And she does not do that lightly. Not without evidence." "Wherever the decision is, whether it's from the administration, as was the case in the Bush Administration, to withhold information from Congress, I fought that. But you don't fight it without a price, because they come after you, and they don't always tell the truth about it. Now, where that's motivated from, I don't know." "This is a matter of great seriousness, the attitude that the CIA had, to the rights of Congress in all of this. It's pretty appalling, what is being alleged or charged." "The administration is the custodian of intelligence information. It is not the owner." If Feinstein were taking on ATF or the Food and Drug Administration, no one would think to describe her as being a "person of courage." Congressional Republicans have been brutally attacking the IRS. None of them has suggested that, as a result, IRS officials or appointed leadership are bound to come after them. In other words, the CIA is out of control in a way that these other agencies aren't. And the reason this isn't considered scandalous? We've grown to expect it. There are many patriots who serve their country in the intelligence community, Pelosi said. And presidential administrations are partly to blame here. She is absolutely right—none of which changes the urgent need to rein in the CIA. --- XT: Agency Fill In Other agencies empirically fill in to continue surveillance Ackerman, 15 --- American national security reporter and blogger, national security editor for the Guardian (6/1/2015, Spencer, The Guardian, “Fears NSA will seek to undermine surveillance reform; Privacy advocates are wary of covert legal acrobatics from the NSA similar to those deployed post-9/11 to circumvent congressional authority,” Lexis, JMP) The rise of what activists have come to call "bulky" surveillance, like the "large collections" of Americans' electronic communications records the FBI gets to collect under the Patriot Act, continue unabated - or, at least, will, once the USA Freedom Act passes and restores the Patriot Act powers that lapsed at midnight on Sunday. Related: FBI used Patriot Act to obtain 'large collections' of Americans' data, DoJ finds That collection, recently confirmed by a largely overlooked Justice Department inspector general's report, points to a slipperiness in shuttering surveillance programs - one that creates opportunities for clever lawyers. The Guardian revealed in 2013 that Barack Obama had permitted the NSA to collect domestic internet metadata in bulk until 2011. Yet even as Obama closed down that NSA program, the Justice Department inspector general confirms that by 2009, the FBI was already collecting the same "electronic communications" metadata under a different authority. It is unclear as yet how the FBI transformed that authority, passed by Congress for the collection of "business records", into large-scale collection of Americans' email, text, instant message, internet-protocol and other records. And a similar power to for the FBI gather domestic internet metadata, obtained through non-judicial subpoenas called "National Security Letters", also exists in a different, non-expiring part of the Patriot Act. --- AT: President Will Comply The President doesn’t matter --- Glennon says a double government exists and a network of officials exists within government that exercises predominant power on national security. The President can’t ensure compliance --- the national security bureaucracy firmly controls the process Glennon, 14 --- Professor of International Law at Tufts (Michael, Harvard National Security Journal, “National Security and Double Government,” http://harvardnsj.org/wpcontent/uploads/2014/01/Glennon-Final.pdf, JMP) Put differently, the question whether the President could institute a complete about-face supposes a topdown policy-making model. The illusion that presidents issue orders and that subordinates simply carry them out is nurtured in the public imagination by media reports of “Obama’s” policies or decisions or initiatives, by the President’s own frequent references to “my” directives or personnel, and by the Trumanites own reports that the President himself has “ordered” them to do something. But true top-down decisions that order fundamental policy shifts are rare.369 The reality is that when the President issues an “order” to the Trumanites, the Trumanites themselves normally formulate the order.370 The Trumanites “cannot be thought of as men who are merely doing their duty. They are the ones who determine their duty, as well as the duties of those beneath them. They are not merely following orders: they give the orders.”371 They do that by “entangling”372 the President. This dynamic is an aspect of what one scholar has called the “deep structure” of the presidency.373 As Theodore Sorensen put it, “Presidents rarely, if ever, make decisions— particularly in foreign affairs—in the sense of writing their conclusions on a clean slate . . . . [T]he basic decisions, which confine their choices, have all too often been previously made.”374 National security bureaucracy acts independent of the President Glennon, 14 --- Professor of International Law at Tufts (Michael, Harvard National Security Journal, “National Security and Double Government,” http://harvardnsj.org/wpcontent/uploads/2014/01/Glennon-Final.pdf, JMP) Sometimes, however, the Trumanites proceed without presidential approval. In 1975, a White House aide testified that the White House “didn’t know half the things” intelligence agencies did that might be legally questionable.378 “If you have got a program going and you are perfectly happy with its results, why take the risk that it might be turned off if the president of the United States decides he does not want to do it,” he asked.379 Other occasions arise when Trumanites in the CIA and elsewhere originate presidential “directives”—directed to themselves.380 Presidents then ratify such Trumanite policy initiatives after the fact.381 To avoid looking like a bystander or mere commentator, the President embraces these Trumanite policies, as does Congress, with the pretense that they are their own.382 To maintain legitimacy, the President must appear to be in charge. In a narrow sense, of course, Trumanite policies are the President’s own; after all, he did formally approve them.383 But the policies ordinarily are formulated by Trumanites— who prudently, in Bagehot’s words, prevent “the party in power” from going “all the lengths their orators propose[].”384 The place for presidential oratory, to the Trumanites, is in the heat of a campaign, not in the councils of government where cooler heads prevail.385 Military frames decision-making to force President to accept the policy it wants Glennon, 14 --- Professor of International Law at Tufts (Michael, Harvard National Security Journal, “National Security and Double Government,” http://harvardnsj.org/wpcontent/uploads/2014/01/Glennon-Final.pdf, JMP) Presidential choice is further circumscribed by the Trumanites’ ability to frame the set of options from which the President may choose— even when the President is personally involved in the decisionmaking process to an unusual degree, as occurred when President Obama determined the number of troops to be deployed to Afghanistan.414 Richard Holbrooke, the President’s Special Representative for Afghanistan and Pakistan, predicted that the military would offer the usual three options— the option they wanted, bracketed by two unreasonable alternatives that could garner no support.415 “And that is exactly what happened,”416 Nasr recalled. It was, as Secretary Gates said, “the classic Henry Kissinger model . . . . You have three options, two of which are ridiculous, so you accept the one in the middle.”417 The military later expanded the options— but still provided no choice. “You guys just presented me [with] four options, two of which are not realistic.” The other two were practically indistinguishable. “So what’s my option?” President Obama asked. “You have essentially given me one option.”418 The military was “really cooking the thing in the direction that they wanted,” he complained. “They are not going to give me a choice.”419 Presidential control is very limited Glennon, 14 --- Professor of International Law at Tufts (Michael, Harvard National Security Journal, “National Security and Double Government,” http://harvardnsj.org/wpcontent/uploads/2014/01/Glennon-Final.pdf, JMP) This is, again, hardly to suggest that the President is without power. Exceptions to the rule occur with enough regularity to create the impression of overall presidential control. “As long as we keep up a double set of institutions—one dignified and intended to impress the many, the other efficient and intended to govern the many—we should take care that the two match nicely,” Bagehot wrote.420 He noted that “[t]his is in part effected by conceding some subordinate power to the august part of our polity . . . .”421 Leadership does matter, or at least it can matter. President Obama’s decision to approve the operation against Osama bin Laden against the advice of his top military advisers is a prominent example.422 Presidents are sometimes involved in the decisional loops, as Bagehot’s theory would predict. Overlap between Madisonians and Trumanites preserves the necessary atmospherics. Sometimes even members of Congress are brought into the loop.423 But seldom do presidents participate personally and directly, let alone the Madisonian institutions in toto. The range of presidential choice is tightly hemmed in.424 As Sorensen wrote in 1981, “[e]ven within the executive branch, the president’s word is no longer final . . . .”425 When the red lights flash and the sirens wail, it is the Trumanites’ secure phones that ring. --- AT: Other Branches Check Checks by federal branches fail --- national security bureaucracy is only concerned with increasing its own power to address threats Glennon, 14 --- Professor of International Law at Tufts (Michael, Harvard National Security Journal, “National Security and Double Government,” http://harvardnsj.org/wpcontent/uploads/2014/01/Glennon-Final.pdf, JMP) A third internal “check,” the Foreign Intelligence Surveillance Court, subsists formally outside the executive branch but for all practical purposes might as well be within it; as noted earlier, it approved 99.9% of all warrant requests between 1979 and 2011.561 In 2013, it approved the NSA collection of the telephone records of tens of millions of Americans, none of whom had been accused of any crime.562 An authentic check is one thing; smoke and mirrors are something else. The first difficulty with such proposed checks on the Trumanite network is circularity; all rely upon Madisonian institutions to restore power to Madisonian institutions by exercising the very power that Madisonian institutions lack. All assume that the Madisonian institutions, in which all reform proposals must necessarily originate, can somehow magically impose those reforms upon the Trumanite network or that the network will somehow merrily acquiesce. All suppose that the forces that gave rise to the Trumanite network can simply be ignored. All assume, at bottom, that Madison’s scheme can be made to work—that an equilibrium of power can be achieved—without regard to the electorate’s fitness. Yet Madison’s theory, again,563 presupposed the existence of a body politic possessed of civic virtue. It is the personal ambition only of officeholders who are chosen by a virtuous electorate that can be expected to translate into institutional ambition. It is legislators so chosen, Madison believed, who could be counted upon to resist encroachments on, say, Congress’s power to approve war or treaties because a diminution of Congress’s power implied a diminution of their own individual power. Absent a virtuous electorate, personal ambition and institutional ambition no longer are coextensive. Members’ principal ambition564 then becomes political survival, which means accepting, not resisting, Trumanite encroachments on congressional power. The Trumanites’ principal ambition, meanwhile, remains the same: to broaden their ever-insufficient “flexibility” to deal with unforeseen threats—that is, to enhance their own power. The net effect is imbalance, not balance. This imbalance has suffused the development of U.S. counterterrorism policy. Trumanites express concerns about convergence, about potentially dangerous link-ups among narco-terrorists, cyber-criminals, human traffickers, weapons traders, and hostile governments.565 Yet their concerns focus largely, if not entirely, on only one side of Madison’s ledger —the government’s need to protect the people from threats—and little, if at all, on the other side: the need to protect the people from the government. As a result, the discourse, dominated as it is by the Trumanites, emphasizes potential threats and deemphasizes tradeoffs that must be accepted to meet those threats. The Madisonians themselves are not troubled about new linkages forged among the newly-created components of military, intelligence, homeland security, and law enforcement agencies—linkages that together threaten civil liberties and personal freedom in ways never before seen in the United States. The earlier “stovepiping” of those agencies was seen as contributing to the unpreparedness that led to the September 11 attacks,566 and after the wearying creation of the Department of Homeland Security and related reorganizations, the Madisonians have little stomach for re-drawing box charts yet again. And so the cogs of the national security apparatus continue to tighten while the scaffolding of the Madisonian institutions continues to erode. Lack of civic virtue prevents effective constraints by 3 branches Glennon, 14 --- Professor of International Law at Tufts (Michael, Harvard National Security Journal, “National Security and Double Government,” http://harvardnsj.org/wpcontent/uploads/2014/01/Glennon-Final.pdf, JMP) There is a third, more fundamental, more worrisome reason why the Madisonian institutions have been eclipsed, as noted earlier in this Article.575 It is the same reason that repairs of the sort enumerated above likely will not endure. And it is not a reason that can be entirely laid at the feet of the Trumanites. It is a reason that goes to the heartbeat of democratic institutions. The reason is that Madisonian institutions rest upon a foundation that has proven unreliable: a general public possessed of civic virtue. Civic virtue, in Madison’s view, required acting for the public interest rather than one’s private interest.576 Madison, realist that he was, recognized that deal-making and self-interest would permeate government; this could be kept in check in part by clever institutional design, with “ambition . . . to counteract ambition”577 among governmental actors to maintain a power equilibrium. But no such institutional backup is available if the general public itself lacks civic virtue—meaning the capacity to participate intelligently in self-government and to elect officials who are themselves virtuous.578 Indeed, civic virtue is thus even more important,579 Madison believed, for the public at large than for public officials; institutional checks are necessary but not sufficient. Ultimately, the most important check on public officials is, as Madison put it, “virtue and intelligence in the community . . . .”580 Institutional constraints are necessary but not sufficient for the survival of liberty, Madison believed; they cannot be relied upon absent a body politic possessed of civic virtue.581 The negative feedback loop ensures that 3 branches will continue to atrophy and be unable to check national security bureaucracy Glennon, 14 --- Professor of International Law at Tufts (Michael, Harvard National Security Journal, “National Security and Double Government,” http://harvardnsj.org/wpcontent/uploads/2014/01/Glennon-Final.pdf, JMP) This is the nub of the negative feedback loop in which the United States is now locked. Resuscitating the Madisonian institutions requires an informed, engaged electorate, but voters have little reason to be informed or engaged if their efforts are for naught—and as they become more uninformed and unengaged, they have all the more reason to continue on that path. The Madisonian institutions thus continue to atrophy, the power of the Trumanite network continues to grow, and the public continues to disengage. 3 branches can’t check national security bureaucracy --- they have an incentive to fall in line Glennon, 14 --- Professor of International Law at Tufts (Michael, Harvard National Security Journal, “National Security and Double Government,” http://harvardnsj.org/wpcontent/uploads/2014/01/Glennon-Final.pdf, JMP) The second difficulty with legal and public-opinion based checks on the Trumanite network is the assumption in Madison’s theory that the three competing branches act independently. “[I]t is evident that each department should have a will of its own,” says The Federalist.570 This is achieved by ensuring that each is “so constituted that the members of each should have as little agency as possible in the appointment of the members of the others.”571 Different policy preferences will obtain because the three Madisonian branches will act upon different motives. But when it counts, the branches do not. Each branch has the same ultimate incentive: to bring its public posture into sync with the private posture of the Trumanites.572 The net effect is “balance,” after a fashion, in the sense that the end result is outward harmony of a sort easily mistaken for Madisonian-induced equipoise. But the balance is not an equilibrium that results from competition for power among three branches struggling “for the privilege of conducting American foreign policy,” as Edward S. Corwin memorably put it.573 The “system” that produces this ersatz consensus is a symbiotic tripartite co-dependence in which the three Madisonian branches fall over themselves to keep up with the Trumanites. The ostensible balance is artificial; it reflects a juridical legerdemain created and nurtured by the Trumanite network, which shares, defends, and begins with the same static assumptions. Bagehot relates the confidential advice of Lord Melbourne to the English Cabinet: “It is not much matter which we say, but mind, we must all say the same.”574 The Madisonian institutions and the Trumanite network honor the same counsel. Congress and courts can’t constrain the national security establishment Glennon, 14 --- Professor of International Law at Tufts (Michael, Harvard National Security Journal, “National Security and Double Government,” http://harvardnsj.org/wpcontent/uploads/2014/01/Glennon-Final.pdf, JMP) IV. The Reality of Madisonian Weakness Although the Madisonian institutions seem to be in charge and, indeed, to be possessed of power broad enough to remedy their own deficiencies, a close look at each branch of government reveals why they are not. A more accurate description would be that those institutions are in a state of entropy and have become, in Bagehot’s words, “a disguise”—“the fountain of honour” but not the “spring of business.”241 The Presidency, Congress, and the courts appear to set national security policy, but in reality their role is minimal. They exercise decisional authority more in form than in substance. This is the principal reason that the system has not, as advertised, self-corrected.242 --- AT: Congress Checks Congress can’t ensure implementation and enforcement --- it is a tool of the national security bureaucracy Glennon, 14 --- Professor of International Law at Tufts (Michael, Harvard National Security Journal, “National Security and Double Government,” http://harvardnsj.org/wpcontent/uploads/2014/01/Glennon-Final.pdf, JMP) B. The Congress Like the courts, Congress’s apparent power also vastly outstrips its real power over national security. Similar to the Trumanites, its members face a blistering work load. Unlike the Trumanites, their work is not concentrated on the one subject of national security. On the tips of members’ tongues must be a ready and reasonably informed answer not only to whether the United States should arm Syrian rebels, but also whether the medical device tax should be repealed, whether and how global warming should be addressed, and myriad other issues. The pressure on legislators to be generalists creates a need to defer to national security experts. To a degree congressional staff fulfill this need. But few can match the Trumanites’ informational base, drawing as they do on intelligence and even legal analysis that agencies often withhold from Congress. As David Gergen put it, “[p]eople . . . simply do not trust the Congress with sensitive and covert programs.”344 The Trumanites’ threat assessments,345 as well as the steps they take to meet those threats, are therefore seen as presumptively correct whether the issue is the threat posed by the targets of drone strikes, by weapons of mass destruction in Iraq, or by torpedo attacks on U.S. destroyers in the Gulf of Tonkin. Looming in the backs of members’ minds is the perpetual fear of casting a career-endangering vote. No vote would be more fatal than one that might be tied causally to a cataclysmic national security breakdown. While the public may not care strongly or even know about many of the Bush policies that Obama has continued, the public could and would likely know all about any policy change—and who voted for and against it—in the event Congress bungled the protection of the nation. No member wishes to confront the “if only” argument: the argument that a devastating attack would not have occurred if only a national security letter had been sent, if only the state secrets privilege had been invoked, if only that detainee had not been released. Better safe than sorry, from the congressional perspective. Safe means strong. Strong means supporting the Trumanites. Because members of Congress are chosen by an electorate that is disengaged and uninformed, Madison’s grand scheme of an equilibrating separation of powers has failed, and a different dynamic has arisen.346 His design, as noted earlier,347 anticipated that ambition counteracting ambition would lead to an equilibrium of power and that an ongoing power struggle would result among the three branches that would leave room for no perilous concentration of power.348 The government’s “several constituent parts” would be “the means of keeping each other in their proper places.”349 But the overriding ambition of legislators chosen by a disengaged and uninformed electorate is not to accumulate power by prescribing policy for the Trumanites, as Madison’s model would otherwise have predicted. Their overriding ambition is to win reelection, an ambition often inconsistent with the need to resist encroachments on congressional power. All members of Congress know that they cannot vote to prescribe—or proscribe—any policy for anyone if they lose reelection. It is not that Madison was wrong; it is that the predicate needed for the Madisonian system to function as intended—civic virtue—is missing. As a result, Trumanite influence permeates the legislative process, often eclipsing even professional committee staff. Trumanites draft national security bills that members introduce. They endorse or oppose measures at hearings and mark-ups. They lobby members, collectively and one-on-one. Their positions appear on the comparative prints that guide members through key conference committee deliberations. Sometimes Trumanites draft the actual language of conference reports. They wait outside the chambers of the House and Senate during floor debates, ready on-the-spot to provide members with instant arguments and data to back them up. Opponents frequently are blind-sided. Much of this activity is removed from the public eye, leading to the impression that the civics-book lesson is correct; Congress makes the laws. But the reality is that virtually everything important on which national security legislation is based originates with or is shaped by the Trumanite network. Conversely, congressional influence in the Trumanites’ decisionmaking processes is all but nil. The courts have, indeed, told Congress to keep out. In 1983, the Supreme Court invalidated a procedure, called the “legislative veto,” which empowered Congress to disapprove of Trumanite arms sales to foreign nations, military initiatives, and other national security projects.350 The problem with the concept, the Court said, was that it permitted Congress to disapprove of executive action without the possibility of a presidential veto.351 A legislative proposal thereafter to give the Senate Intelligence Committee the power to approve or disapprove covert actions was rejected, on the grounds that the Court had ruled out such legislative controls.352 Restrictions will fail --- executive will circumvent Pierce, 14 (Charles P., 2/17/2014, “The Imperial Masquerade of Barack Obama,” http://www.esquire.com/blogs/politics/Imperial_Masquerade) As much as we probably would like it not to happen, the Lawless President narrative seems to have reached that stage in our national dialogue in which enough of "some people" are "saying" things about it that the courtier press feels obligated to "cover the controversy," which is how we're all going to have to spend months listening to our radio Tom Paines -- on whom the actual Tom Paine would not have deigned to spit - tell us that Liberty (!) is indeed threatened by what the president is about these days. Look, if I thought our current political class capable of engaging the public in a serious debate over the wildassed expansion of executive power over the last 50 years, and if I thought it had the courage to do something about it, I'd be at the front of the line. But, come on, can you see the Congress making a serious attempt to re-establish the constitutional war powers that it has deeded away piecemeal to the Executive over the past 70 years? (In the long view of history, it was plain that the War Powers Act essentially was dead from birth.) Can you see the establishment of legitimate congressional oversight of, say, the intelligence community, and the use to which every president puts it? Can you imagine a serious congressional prohibition of drone warfare that the Executive would not feel free to violate with impunity? Instead, we get an argument whittled down to a fine point of stupid -- Our President Is A Nicer Authoritarian Than Yours Is. There is a Democrat in the White House so it is the Republicans -- and the conservative monkeyhouse that is the party's policy apparatus -- howling about imperial presidencies after being deadly silent about C-Plus Augustus and his signing statements and the vast arrogation of power that occurred under the doctrine of the unitary executive. And vice versa. And so on, forever, we go. Charlie Savage, the truly invaluable national-security reporter at The New York Times, put it plainly in Takeover, his book on the imperial administration of George W. Bush and Dick Cheney: Whenever presidentialists have gained control of the White House, they have tended to make grandiose claims of presidential power. Then, when scandals and misgovernment have arisen, the presidentialists have temporarily retreated, only to slowly retake the ground they lost. The Korean War, the Vietnam War and the Watergate scandal, the Iran-Contra scandal, and now the Iraq War and the war on terrorism are all chapters in this history. Each one has also been a difficult time in America. As loud as is the current frothing over some unlateral tinkering with the Affordable Care Act, and the president's decision to get the Pentagon janitors a raise, prior to the John Yoo-sanctified follies of the previous administration, the clearest example of how destructive an unmoored and unrestrained Executive can be was, as Savage points out, the Iran-Contra foolishness, which remains the great lost opportunity for the country and its politicians to stuff the presidency back into the constitutional corral where it belongs. We all blew that one -- the politicians did, certainly, but so, disgracefully, did the elite media and, ultimately, so did the American people their own selves. In 1988, knowing full well what had gone on, we elected to the presidency a vice-president who was hip-deep in the crimes and the cover-up, and we did it because he was able to feign anger convincingly enough while lying his withered hindquarters off to Dan Rather. In A Very Thin Line, his definitive account of the Iran-Contra crimes, historian Theodore Draper gives us an account of what happened to the only serious congressional attempt to respond to the demonstrable lawlessness of the Reagan administration. As you may recall, Iran-Contra was essentially an attempt by the Reagan White House to evade a law prohibiting direct American aid to the various priest-killers and nun-rapers we were supporting in Central America. (There were a number of other facets, but that's basically what it was all about.) One of the ways the Reagan people tried to get around the law was to solicit aid -- financial and otherwise -- from third countries. In the summer of 1989, Senator Daniel Patrick Moynihan introduced a bill specifically designed to close that loophole, and to make what the Reaganauts tried to do a felony. As Draper points out, all hell promptly broke loose. President George H.W. Bush threatened to veto the bill, which he eventually did at the end of November. Nobody in the country said boo, even though Moynihan had drafted a bill that specifically addressed the crimes at the heart of a scandal that had occupied the government for two years, and that nearly blew up a presidency, and probably should have, and a president who knew goddamn good and well what had gone on vetoed the bill, which was directly aimed at prohibiting activities in which said president had been intimately involved. The nation yawned. A lot of it was simple apathy, and the steady abandonment on the part of the country of the obligations of self-government, and the concomitant lassitude as to their duties by the politicians elected by an apathetic electorate. Some of it was simple fear; this was particularly true of the press, which, as Mark Hertsgaard explains in On Bended Knee, didn't want to be thought of as having "destroyed" another lawless presidency, as though that wasn't the essential job description in Amendment I. (This, of course, was not a consideration in the 1990's, when a lot of the same people spent two years chasing Bill Clinton's penis all over the Beltway.) This dereliction was usually excused within the elite media with the condescending argument that "the people" could not stand the trauma of another "failed presidency." But this is inexcusable timidity. As Draper writes: Not every dispute over the Constitution endangers it. This one, however, is qualitatively different. An authoritarian, autocratic presidency in "the management of foreign relations" is still a clear and present danger, "most susceptible of abuse of all the trusts committed to a Government." And whatever we may think of the constitutional issue, there remains the question: Do we want that kind of presidency? The answer, for the moment, remains generally yes. Everything else is political noise. --- AT: Courts Check Judicial restrictions can’t solve --- will either throw out cases or be biased and defer Glennon, 14 --- Professor of International Law at Tufts (Michael, Harvard National Security Journal, “National Security and Double Government,” http://harvardnsj.org/wpcontent/uploads/2014/01/Glennon-Final.pdf, JMP) The judiciary, in short, does not have the foremost predicate needed for Madisonian equilibrium: “a will of its own.”304 Whatever the court, judges normally are able to find what appear to the unschooled to be sensible, settled grounds for tossing out challenges to the Trumanites’ projects. Dismissal of those challenges is couched in arcane doctrine that harks back to early precedent, invoking implicitly the courts’ mystical pedigree and an aura of politics-transcending impartiality. But challenges to the Trumanites’ projects regularly get dismissed before the plaintiff ever has a chance to argue the merits either before the courts or, sometimes more importantly, the court of public opinion. Try challenging the Trumanites’ refusal to make public their budget305 on the theory that the Constitution does, after all, require “a regular statement and account of the receipts and expenditures of all public money”;306 or the membership of Members of Congress in the military reserve307 on the theory that the Constitution does, after all, prohibit Senators and Representatives from holding “any office under the United States”;308 or the collection of phone records of the sort given by Verizon to the NSA on the theory that the law authorizing the collection is unconstitutional.309 Sorry, no standing, case dismissed.310 Try challenging the domestic surveillance of civilians by the U.S. Army311 on the theory that it chills the constitutionally protected right to free assembly,312 or the President’s claim that he can go to war without congressional approval313 on the theory that it is for Congress to declare war.314 Sorry, not ripe for review, case dismissed.315 Try challenging the introduction of the armed forces into hostilities in violation of the War Powers Resolution.316 Sorry, political question, non-justiciable, case dismissed.317 Try challenging the Trumanites’ refusal to turn over relevant and material evidence about an Air Force plane accident that killed three crew members through negligence,318 or about racial discrimination against CIA employees,319 or about an “extraordinary rendition” involving unlawful detention and torture.320 Sorry, state secrets privilege, case dismissed.321 Sometimes the courts have no plausible way of avoiding the merits of national security challenges. Still, the Trumanites win. The courts eighty years ago devised a doctrine—the “non-delegation doctrine”—that forbids the delegation of legislative power by Congress to administrative agencies.322 Since that time it has rarely been enforced, and never has the Court struck down any delegation of national security authority to the Trumanite apparatus.323 Rather, judges stretch to find “implied” congressional approval of Trumanite initiatives. Congressional silence, as construed by the courts, constitutes acquiescence.324 Even if that hurdle can be overcome, the evidence necessary to succeed is difficult to get; as noted earlier,325 the most expert and informed witnesses all have signed nondisclosure agreements, which prohibit any discussion of “classifiable” information without pre-publication review by the Trumanites. As early as 1988, over three million present and former federal employees had been required to sign such agreements as a condition of employment.326 Millions more have since become bound to submit their writings for editing and redaction before going to press. And as the ultimate trump card, the Trumanites are cloaked in, as the Supreme Court put it, “the very delicate, plenary and exclusive power of the President as the sole organ of the federal government in the field of international relations—a power which does not require as a basis for its exercise an act of Congress.”327 The basis of their power, the Court found, is, indeed, not even the Constitution itself; the basis of Trumanite power is external sovereignty—the membership of the United States in the community of nations, which confers extra-constitutional authority upon those charged with exercising it.328 Courts can’t effectively constrain executive national security officials Glennon, 14 --- Professor of International Law at Tufts (Michael, Harvard National Security Journal, “National Security and Double Government,” http://harvardnsj.org/wpcontent/uploads/2014/01/Glennon-Final.pdf, JMP) Yet the larger picture remains valid. Through the long list of military conflicts initiated without congressional approval—Grenada, Panama, Kosovo, and, most recently, Libya—the courts have never stopped a war, with one minor (and temporary) exception. In 1973, Justice William O. Douglas did issue an order to halt the bombing of Cambodia333—which lasted a full nine hours, until the full Supreme Court overturned it.334 The Court’s “lawless” reversal was effected through an extraordinary telephone poll of its members conducted by Justice Thurgood Marshall. “[S]ome Nixon men,” Douglas believed, “put the pressure on Marshall to cut the corners.”335 Seldom do judges call out even large-scale constitutional violations that could risk getting on the wrong side of an angry public, as American citizens of Japanese ethnicity discovered during World War II.336 Whatever the cosmetic effect, the four cases representing the Supreme Court’s supposed “push-back” against the War on Terror during the Bush Administration freed, at best, a tiny handful of detainees.337 As of 2010 fewer than 4% of releases from Guantánamo followed a judicial release order.338 A still-unknown number of individuals, numbering at least in the dozens, fared no better. These individuals were detained indefinitely— without charges, based on secret evidence, sometimes without counsel—as “material witnesses” following 9/11.339 One can barely find a case in which anyone claiming to have suffered even the gravest injury as the result of the Bush-Obama counterterrorism policies has been permitted to litigate that claim on the merits—let alone to recover damages. The Justice Department’s seizure of Associated Press (“AP”) records was carried out pursuant to judicially-approved subpoenas, in secret, without any chance for the AP to be heard.340 The FISC 341 has barely pretended to engage in real judicial review. Between 1979 and 2011, the court received 32,093 requests for warrants. It granted 32,087 of those requests, and it turned down eleven.342 In 2012, the court received 1,789 requests for electronic surveillance, one of which was withdrawn. All others were approved.343 The occasional counterexample notwithstanding, the courts cannot seriously be considered a check on America’s Trumanite network. And, at best, the plan just perpetuates the façade that the judiciary can effectively constrain the executive Glennon, 14 --- Professor of International Law at Tufts (Michael, Harvard National Security Journal, “National Security and Double Government,” http://harvardnsj.org/wpcontent/uploads/2014/01/Glennon-Final.pdf, JMP) As is true with respect to the other Madisonian institutions, there are, of course, instances in which the judiciary has poached on the Trumanites’ domain. The courts rebuffed an assertion of the commanderinchief power in ordering President Truman to relinquish control of the steel mills following their seizure during the Korean War.329 Over the Trumanites’ objections, the courts permitted publication of the Pentagon Papers that revealed duplicity, bad faith, and ineptitude in the conduct of the Vietnam War.330 The Supreme Court did overturn military commissions set up to try enemy combatants for war crimes,331 and two years later found that Guantánamo detainees had unlawfully been denied habeas corpus rights.332 Personnel does sometimes matter. Enough apparent counterexamples exist to preserve the façade. --- AT: We Make Congress / Courts / President Better Madisonian institutions can’t be reformed to effectively restrict national security bureaucracy Glennon, 14 --- Professor of International Law at Tufts (Michael, Harvard National Security Journal, “National Security and Double Government,” http://harvardnsj.org/wpcontent/uploads/2014/01/Glennon-Final.pdf, JMP) Some suggest that the answer is to admit the failure of the Madisonian institutions, recognize that for all their faults the external checks are all that really exist, acknowledge that the Trumanite network cannot be unseated, and try to work within the current framework.530 But the idea that external checks alone do or can provide the needed safeguards is false. If politics were the effective restraint that some have argued it is,531 politics—intertwined as it is with law—would have produced more effective legalist constraints. It has not. The failure of law is and has been a failure of politics. If the press and public opinion were sufficient to safeguard what the Madisonian institutions were designed to protect, the story of democracy would consist of little more than a series of elected kings, with the rule of law having frozen with the signing of Magna Carta in 1215. Even with effective rules to protect free, informed, and robust expression—which is an enormous assumption—public opinion alone cannot be counted upon to protect what law is needed to protect. The hope that it can do so recalls earlier reactions to Bagehot’s insights—the faith that “the people” can simply “throw off” their “deferential attitude and reshape the political system,” insisting that the Madisonian, or dignified, institutions must “once again provide the popular check” that they were intended to provide.532 That, however, is exactly what many thought they were doing in electing Barack Obama as President. The results need not be rehearsed; little reason exists to expect that some future public effort to resuscitate withered Madisonian institutions would be any more successful. Indeed, the added power that the Trumanite network has taken on under the Bush- Obama policies would make that all the more difficult. It is simply naïve to believe that a sufficiently large segment of informed and intelligent voters can somehow come together to ensure that sufficiently vigilant Madisonian surrogates will somehow be included in the national security decisionmaking process to ensure that the Trumanite network is infused with the right values. Those who believe that do not understand why that network was formed, how it operates, or why it survives. They want it, in short, to become more Madisonian. The Trumanite network, of course, would not mind appearing more Madisonian, but its enduring ambition is to become, in reality, less Madisonian. --- AT: Public Opinion Ensures Compliance National security bureaucracy will buck the President and manipulate public opinion to control policymaking Glennon, 14 --- Professor of International Law at Tufts (Michael, Harvard National Security Journal, “National Security and Double Government,” http://harvardnsj.org/wpcontent/uploads/2014/01/Glennon-Final.pdf, JMP) The idea that presidential backbone is all that is needed further presupposes a model in which the Trumanites share few of the legitimacy-conferring features of the constitutional branches and will easily submit to the President. But that supposition is erroneous. Mass entertainment glorifies the military, intelligence, and law enforcement operatives that the Trumanites direct. The public is emotionally taken with the aura of mystery surrounding the drone war, Seal Team Six, and cyber-weapons. Trumanites, aided by Madisonian leaks, embellish their operatives’ very real achievements with fictitious details, such as the killing of Osama bin Laden386 or the daring rescue of a female soldier from Iraqi troops.387 They cooperate with the making of movies that praise their projects, like Zero Dark Thirty and Top Gun, but not movies that lampoon them, such as Dr. Strangelove (an authentic F-14 beats a plastic B-52 every time).388 Friendly fire incidents are downplayed or covered up.389 The public is further impressed with operatives’ valor as they are lauded with presidential and congressional commendations, in the hope of establishing Madisonian affiliation.390 Their simple mission—find bad guys and get them before they get us—is powerfully intelligible. Soldiers, commandos, spies, and FBI agents occupy an honored pedestal in the pantheon of America’s heroes. Their secret rituals of rigorous training and preparation mesmerize the public and fortify its respect. To the extent that they are discernible, the Trumanites, linked as they are to the dazzling operatives they direct, command a measure of admiration and legitimacy that the Madisonian institutions can only envy.391 Public opinion is, accordingly, a flimsy check on the Trumanites; it is a manipulable tool of power enhancement. It is therefore rarely possible for any occupant of the Oval Office to prevail against strong, unified Trumanite opposition, for the same reasons that members of Congress and the judiciary cannot; a non-expert president, like a non-expert senator and a non-expert judge, is intimidated by expert Trumanites and does not want to place himself (or a colleague or a potential political successor) at risk by looking weak and gambling that the Trumanites are mistaken. So presidents wisely “choose” to go along. The public and media is not a suitable check Glennon, 14 --- Professor of International Law at Tufts (Michael, Harvard National Security Journal, “National Security and Double Government,” http://harvardnsj.org/wpcontent/uploads/2014/01/Glennon-Final.pdf, JMP) It might also be supposed that existing, non-Madisonian, external restraints pose counterweights that compensate for the weakness of internal, Madisonian checks. The press, and the public sentiment it partially shapes, do constrain the abuse of power—but only up to a point. To the extent that the “marketplace of ideas” analogy ever was apt, that marketplace, like other marketplaces, is given to distortion. Public outrage is notoriously fickle, manipulable, and selective, particularly when driven by anger, fear, and indolence. Sizeable segments of the public—often egged on by public officials—lash out unpredictably at imaginary transgressors, failing even in the ability to identify sympathetic allies.518 “[P]ublic opinion,” Sorensen wryly observed, “is not always identical with the public interest.”519 The influence of the media, whether to rouse or dampen, is thus limited. The handful of investigative journalists active in the United States today are the truest contemporary example of Churchill’s tribute to the Royal Air Force.520 In the end, though, access remains everything to the press. Explicit or implicit threats by the targets of its inquiries to curtail access often yield editorial acquiescence. Members of the public obviously are in no position to complain when a story does not appear. Further, even the best of investigative journalists confront a high wall of secrecy. Finding and communicating with (on deep background, of course) a knowledgeable, candid source within an opaque Trumanite network resistant to efforts to pinpoint decisionmakers521 can take years. Few publishers can afford the necessary financial investment; newspapers are, after all, businesses, and the bottom line of their financial statements ultimately governs investigatory expenditures. Often, a second corroborating source is required. Even after scaling the Trumanite wall of secrecy, reporters and their editors often become victims of the deal-making tactics they must adopt to live comfortably with the Trumanites. Finally, members of the mass media are subject to the same organizational pressures that shape the behavior of other groups. They eat together, travel together, and think together. A case in point was the Iraq War. The Washington Post ran twenty-seven editorials in favor of the war along with dozens of oped pieces, with only a few from skeptics.522 The New York Times, Time, Newsweek, the Los Angeles Times, and the Wall Street Journal all marched along in lockstep. 523 As Senator Eugene McCarthy aptly put it, reporters are like blackbirds; when one flies off the telephone wire, they all fly off.524 More importantly, the premise—that a vigilant electorate fueled by a skeptical press together will successfully fill the void created by the hollowed-out Madisonian institutions—is wrong.525 This premise supposes that those outside constraints operate independently, that their efficacy is not a function of the efficacy of internal, Madisonian checks.526 But the internal and external checks are woven together and depend upon one another. 527 Non-disclosure agreements (judicially-enforced gag orders, in truth) are prevalent among those best positioned to criticize.528 Heightened efforts have been undertaken to crush vigorous investigative journalism and to prosecute and humiliate whistleblowers and to equate them with spies under the espionage laws. National security documents have been breathtakingly over-classified. The evasion of Madisonian constraints by these sorts of policies has the net effect of narrowing the marketplace of ideas, curtaining public debate, and gutting both the media and public opinion as effective restraints.529 The vitality of external checks depends upon the vitality of internal Madisonian checks, and the internal Madisonian checks only minimally constrain the Trumanites. --- AT: Consensus Exists Consensus not meaningful --- it is just political branches trying to stay in sync with national security bureaucracy Glennon, 14 --- Professor of International Law at Tufts (Michael, Harvard National Security Journal, “National Security and Double Government,” http://harvardnsj.org/wpcontent/uploads/2014/01/Glennon-Final.pdf, JMP) It is no answer to insist that, whatever the system’s faults, the Madisonian accountability mechanisms have at least generated a political consensus.567 Even if consensus exists among the Madisonians themselves, the existence of a public consensus on national security policy is at best doubtful.568 Further, if the application of Bagehot’s theory to U.S. national security policy is correct, whatever consensus does exist at the political level is synthetic in that it derives not from contestation among the three branches of the federal government but from efforts of the Madisonian institutions to remain in sync with the Trumanite network. That network is the moving force behind any consensus. It has forged the policies that the consensus supports; it has orchestrated Madisonian support. Finally, even if real, the existence of a Madisonian/Trumanite consensus says nothing about the content of the consensus—nothing about whether Madison’s second great goal of protecting the people from the government has been vindicated or defeated. Autocracy can be consensusbased. The notion of a benign modern-day consensus on national security policy is, indeed, reminiscent of the observation of Richard Betts and Leslie Gelb who, reviewing agreements that emerged from national security deliberations during the Johnson Administration, concluded that “the system worked.”569 Well, perhaps; the result was Vietnam. --- AT: Double Government Thesis Wrong Double government does exist in the U.S. --- bureaucracy is self-multiplying Glennon, 14 --- Professor of International Law at Tufts (Michael, Harvard National Security Journal, “National Security and Double Government,” http://harvardnsj.org/wpcontent/uploads/2014/01/Glennon-Final.pdf, JMP) To many, inculcated in the hagiography of Madisonian checks and balances and oblivious of the reach of Trumanite power, the response to these realizations will be denial. The image of a double national security government will be shocking. It cannot be right. It sounds of conspiracy, “a state within,” and other variations on that theme. “The old notion that our Government is an extrinsic agency,” Bagehot wrote, “still rules our imaginations.”603 That the Trumanite network could have emerged in full public view and without invidious intent makes its presence all the more implausible. Its existence challenges all we have been taught. There is, however, little room for shock. The pillars of America’s double government have long stood in plain view for all to see. We have learned about significant aspects of what Bagehot described—from some eminent thinkers. Max Weber’s work on bureaucracies showed that, left unchecked, the inexorability of bureaucratization can lead to a “polar night of icy darkness” in which humanitarian values are sacrificed for abstract organizational ends.604 Friedrich Hayek’s work on political organization led him to conclude that “the greatest danger to liberty today comes from the men who are most needed and most powerful in government, namely, the efficient expert administrators exclusively concerned with what they regard as the public good.”605 Eric Fromm’s work on social psychology showed how people unconsciously adopt societal norms as their own to avoid anxiety-producing choices, so as to “escape from freedom.”606 Irving Janis’s work on group dynamics showed that the greater a group’s esprit de corps, “the greater the danger that independent critical thinking will be replaced by groupthink, which is likely to result in irrational and dehumanizing actions directed against out-groups.”607 Michael Reisman’s work on jurisprudence has shown how de facto operational codes can quietly arise behind publicly-embraced myth systems, allowing for governmental conduct that is not approved openly by the law.608 Mills’ 1956 work on power elites showed that the centralization of authority among officials who hold a common world view and operate in secrecy can produce a “military metaphysic” directed at maintaining a “permanent war economy.”609 One person familiar with Mills’ work was political scientist Malcolm Moos, the presidential speechwriter who five years later wrote President Eisenhower’s prophetic warning.610 “In the councils of government,” Eisenhower said, “we must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military-industrial complex. The potential for the disastrous rise of misplaced power exists and will persist.”611 Bagehot anticipated these risks. Bureaucracy, he wrote, is “the most unimproving and shallow form of government,”612 and the executive that commands it “the most dangerous.”613 “If it is left to itself,” he observed, “without a mixture of special and non-special minds,” decisional authority “will become technical, self-absorbed, self-multiplying.”614 The net result is responsibility that is neither fixed nor ascertainable but diffused and hidden,615 with implications that are beyond historical dispute. “The most disastrous decisions in the twentieth century,” in Robert Dahl’s words, “turned out to be those made by authoritarian leaders freed from democratic restraints.”616 The benefits derived by the United States from double government—enhanced technical expertise, institutional memory and experience, quick-footedness, opaqueness in confronting adversaries, policy stability, and insulation from popular political oscillation and decisional idiosyncrasy —need hardly be recounted. Those benefits, however, have not been cost-free. The price lies in well-known risks flowing from centralized power, unaccountability, and the short-circuiting of power equilibria. Indeed, in this regard the Framers thought less in terms of risk than certainty. John Adams spoke for many: “The nation which will not adopt an equilibrium of power must adopt a despotism. There is no other alternative.”617 Advantage Answers 1nc Terrorism Adv ***note when prepping file --- this block contains almost exclusively evidence to answer the 1ac internal links. You should supplement this with link turns (surveillance good to prevent terrorism) and uniqueness evidence about winning the war on terror now. If you are not straight turning the advantage, you should also supplement the block with other arguments, especially impact answers. CVE fails for a number of reasons --- won’t check extremism Not implemented correctly, bureaucratic turf fights, lacks funding, doesn’t make Americans safer Crowley, 15 (1/8/2015, Michael, “No answer for homegrown terrorism? Obama’s plan to combat radicalization is a flop, critics say,” http://www.politico.com/story/2015/01/homegrown-terrorism-obamaadministration-114100.html, JMP) In early 2011, White House officials realized they had a problem on their hands: the threat of homegrown Islamic radicalism In the two years since President Obama had taken office, several young Muslim Americans had plotted terrorist attacks at home, including one who nearly exploded a car bomb in Times Square. White House aides concluded that the government’s efforts to combat radicalism within America’s Muslim communities were a disjointed mess. Denis McDonough, a top Obama aide who is now White House chief of staff, took charge of the problem, overseeing a strategy to prevent violent extremism. Released that summer, the plan focused on creating closer partnerships with community leaders to help identify budding radicals and steer them to a peaceful path. Obama, McDonough said in a speech that year, “has been focused on this since he took office. Behind closed doors, he has insisted that his national security team make this a priority.” But after a recent string of attacks on their fellow citizens by Islamic radicals, including Wednesday’s massacre in Paris by a pair of French nationals, critics complain that the plan has been halfheartedly implemented, produced bureaucratic turf fights, lacks funding, and does little to make Americans safer at a moment when the Islamic extremist message is more prevalent than ever. “I don’t think we have a strategy,” said House Homeland Security Committee Chairman Michael McCaul. “We don’t see a lead agency, there’s no line item in the budget. There are no metrics to measure success. We don’t even have a common definition for what it is.” The complaints don’t come only from Republicans like McCaul. Even one of the key authors of the 2011 White House strategy, issued under the president’s signature, now doubts its effectiveness. “Considering where we started, we’ve made progress. Is it really affecting things on the ground? I don’t know,” said Quintan Wiktorowicz, a former Obama national security council aide who specializes in radical extremism. Their “Muslim-American cooperation” claim is wrong and offensive Crowley, 15 (1/8/2015, Michael, “No answer for homegrown terrorism? Obama’s plan to combat radicalization is a flop, critics say,” http://www.politico.com/story/2015/01/homegrown-terrorism-obamaadministration-114100.html, JMP) Meanwhile, even as Obama’s strategy takes fire from national security hawks like McCaul, it has rankled some civil liberties advocates — as well as senior law enforcement officials in Washington — who call it misguided and even counterproductive. A public outreach strategy is built on a “false premise,” says Mike German, a former undercover FBI agent now with the Brennan Center for Justice, namely that “there is a monolithic Muslim community [whose leaders] know who the bad guys are and simply aren’t telling. That’s both factually wrong and insulting to the innocent Muslim community.” Some Muslim leaders have in fact complained about Obama’s strategy, which was careful not to single out any particular religion but has focused on Muslim communities in practice. Homeland Security Secretary Jeh Johnson has called building that trust “a personal priority,” and has held closed-door meetings with American Muslim leaders. Officials say that several would-be domestic terrorists have been identified thanks to tips from within their communities, and that better trust between law enforcement and Muslim leaders will encourage more such reporting. But German warns that a “If you see something, say something” policy can be counter-productive, creating false alarms and deluging law enforcement officials with false leads. German noted that, in an April 2014 speech, Obama’s top counterterrorism advisor, Lisa Monaco, suggested that parents be alert to “sudden personality changes in their children at home — becoming confrontational.” “Okay, but do we want every parent with a belligerent teenager to call the FBI?” German asked. “Rather than spending resources focusing on innocent people and communities, they should be focusing their time and attention on people they have some factual basis to suspect of wrongdoing.” Programs to prevent extremism will fail --- we don’t understand the causes AND Britain proves community outreach programs create a stigma that actually reduces cooperation Byman, 15 --- professor in the security studies program at Georgetown University and research director of the Center for Middle East Policy at Brookings (2/13/2015, Daniel, “Five myths about violent extremism,” http://www.washingtonpost.com/opinions/five-myths-about-violent-extremism/2015/02/13/2dc72786b215-11e4-827f-93f454140e2b_story.html, JMP) Citing the “tragic attacks in Ottawa, Sydney, and Paris,” the White House on Wednesday is convening a summit on violent extremism. Its goal is admirable and ambitious: neutralizing terrorism’s root causes by stopping people from radicalizing in the first place. Yet the causes of violent extremism are poorly understood, and programs are often targeted at the wrong audiences. So to help the world leaders at the summit do more good than harm, let’s dispel some of the biggest myths. 1. We understand radicalization. The just-released National Security Strategy warns repeatedly of the danger of extremism, citing weak governance, widespread grievances, repression and the lack of a flourishing civil society among other causes that allow “extremism to take root.” This list suggests that we know what motivates radicalization — but almost every social malady falls into these categories. The difficult reality is that there is no single path toward radicalization; it varies by country, by historical period and by person. Experts have long searched for a useful psychological profile of terrorists, without much success. The problem, as terrorism scholar Bruce Hoffman observed many years ago, is “how disturbingly ‘normal’ most terrorists seem.” Nor does the answer lie in the realm of faith. Many volunteers for terrorist groups have little knowledge of religion. Indeed, their lack of religious knowledge makes them easy prey for recruiters who don the mantle of religious authority. The two British Muslims who bought “Islam for Dummies” before heading to Syria are more the rule than the exception. And describing an entire religious group as potentially dangerous isn’t especially helpful. Britain’s Prevent program, which included efforts to promote community cohesion and fight extremist ideology, made Muslims feel stigmatized and made it harder to gain their cooperation. Community outreach not key to counter-terror programs AND Muslim-American communities are already providing info Crowley, 15 (2/18/2015, Michael, “Barack Obama’s 'extremism' language irks both sides; His carefully selected words on ISIL have frustrated both the left and the right,” http://www.politico.com/story/2015/02/barack-obamas-extremism-language-irks-both-sides-115304.html, JMP) ***Note --- Hina Shamsi is director of the American Civil Liberties Union’s national security project Critics of community outreach programs say little data exists to demonstrate their effectiveness in spotting terrorists. One academic guest at Wednesday’s summit admitted as much, Shamsi said. Nor, they argue, is there reason to believe Muslim-American communities are shy about reporting would-be radicals: A 2011 study by a University of North Carolina at Chapel Hill sociologist found that “the largest single source of initial information [about terror plots] … involved tips from the Muslim-American community.” The plan won’t make CVE effective --- mistrust of government runs too deep because of past outreach programs that doubled as surveillance policies Crowley, 15 (2/18/2015, Michael, “Barack Obama’s 'extremism' language irks both sides; His carefully selected words on ISIL have frustrated both the left and the right,” http://www.politico.com/story/2015/02/barack-obamas-extremism-language-irks-both-sides-115304.html, JMP) Barack Obama’s summit on violent extremism has come under fire from conservatives who are bashing his reluctance to use the words “Islam” and “Muslim” to describe the threat from terror groups like Al Qaeda and the Islamic State in Iraq and the Levant. But in his remarks at the event Wednesday, Obama sounded more concerned about mollifying Muslim Americans who feel targeted by government outreach to their communities, promising not to “securitize” the relationship. Even so, some Muslim American and civil rights leaders said much of Wednesday’s session of the White House’s three-day Countering Violent Extremism summit — which focused on the threat from domestic radicals — was based on flawed premises. “Today’s summit confirmed that there are significant reasons for concern about [such] approaches and that none of the hard questions about protection of civil rights and privacy have yet been answered,” said Hina Shamsi, director of the American Civil Liberties Union’s national security project. Shamsi, who attended Wednesday’s proceedings, said that while White House officials had listened to such concerns in private meetings, they were given little airing at the summit. With Americans joining ISIL and Al Qaeda in Syria, and after recent domestic terror attacks in Europe and Canada, the Obama administration is on high alert for terror attacks staged from within. A plan to counter domestic radicalism launched in 2011 under the supervision of Denis McDonough, now Obama’s chief of staff, aimed to identify possible terrorists before they struck through education about risk factors and greater dialogue and trust between law enforcement and local communities. On Wednesday, Obama touted pilot programs in Boston, Los Angeles and Minneapolis-St. Paul that embody such efforts. Many Muslim leaders protest that they are the obvious focus of the initiatives, even if they are described in the generic, non-religious terms that annoy conservatives. And they say the difficult art of discerning emerging terrorists from brooding social misfits is outweighed by the risk of civil liberties violations. “Since Sept. 11, Muslims have been targeted and profiled, and we have created this narrative that we need to ‘watch out’ for the Muslim community,” said Jaylani Hussein, executive director of the Minnesota chapter of the Council on Muslim-American Relations. In his remarks on Wednesday, Obama took care to address such anxieties. “I know some Muslim Americans have concerns about working with government, particularly law enforcement. And their reluctance is rooted in the objection to certain practices where Muslim Americans feel they’ve been unfairly targeted,” Obama said. “So, in our work, we have to make sure that abuses stop, are not repeated, that we do not stigmatize entire communities. Nobody should be profiled or put under a cloud of suspicion simply because of their faith. Engagement with communities can’t be a cover for surveillance.” Critics of Obama’s efforts were not satisfied. “The idea that you’re tying outreach to terrorist activity is both offensive to the community and specious from a counterterrorism research perspective,” said Mike German of the Brennan Center for Justice at New York University School of Law. The frustration extends beyond civil liberties advocates and into the Muslim-American communities the Obama administration hopes to reach. One of them is the Minneapolis-St. Paul area, home to a large Muslim immigrant population and the site of one of three counter-radicalism pilot programs featured by the White House during Wednesday’s program. CAIR’s Hussein said many Muslims there mistrust government outreach — especially after recent efforts appeared to be doubling as a means of surveillance. After 22 Somali-Americans left the area to join the radical Islamic group Al Shabab in Somalia from 2007 to 2009, the FBI helped the Justice Department expand a longstanding community policing effort with no particular terrorism focus known as the Community Outreach program. Unknown to local residents, according to a September 2014 report by the Brennan Center that drew from government documents, that program was funded and run by FBI counterterrorism officials in Washington collecting data on possible radicals. The FBI revised its policies in 2010 to draw a clearer line between outreach and intelligence. “[M]embers of the public contacted through a community outreach activity,” one internal memo noted, “generally do not have an expectation that information about them will be maintained in an FBI file or database.” The mistrust lingers within Muslim communities, Hussein said: “People believe that even talking about foreign policy puts you on some kind of watch list.” --- XT: CVE Fails CVE won’t solve --- funding shortages discourage outreach and there is resistance within the government to it Crowley, 15 (1/8/2015, Michael, “No answer for homegrown terrorism? Obama’s plan to combat radicalization is a flop, critics say,” http://www.politico.com/story/2015/01/homegrown-terrorism-obamaadministration-114100.html, JMP) ***note --- Quintan Wiktorowicz is a former Obama national security council aide who specializes in radical extremism, and Michael McCaul is House Homeland Security Committee Chairman Adding to frustration among the program’s advocates, the White House announced in September that it would host an October summit dedicated to the issue. But the event has since been postponed twice, and a firm date still has not been set. A senior administration official made no apology for the plan on Thursday, touting it as “a centerpiece of this administration’s counterterrorism strategy.” “Our CVE approach is premised on the principle that local partners, including local law enforcement and communities, are at the forefront of preventing violent radicalization and recruitment both online and person-to-person,” says the official. But Wiktorowicz echoes McCaul’s concern that no federal dollars are specifically allocated to the kind of counter-extremism programs Obama’s 2011 strategy described, which included better communication between the government and community leaders from religious figures to Little League coaches, as well as efforts to challenge radical interpretations of Islam. That means departments and agencies see a zero-sum game when it comes to reaching out to Muslim communities. A former government official says that local FBI offices often consider such outreach to be “social work” that requires agents to be pulled off active criminal cases. And while the FBI set up a Countering Violent Extremism Office in 2011, it has been plagued by “personnel turnover, underfunding, and resistance from CVE skeptics in the Bureau,” Wictorowicz wrote in a June post for the national security blog Lawfare. Funding shortfalls will undermine the program Schmitt, 14 (10/5/2014, Eric, “U.S. Is Trying to Counter ISIS's Efforts to Lure Alienated Young Muslims,” Lexis, JMP) But efforts at countering violent extremism, especially at home, ''have lagged badly behind other counterterrorism pillars,'' said Michael Leiter, a former director of the National Counterterrorism Center. ''It is heartening to see the administration attempt to invigorate those efforts, but it is unfortunate that it has, despite the efforts of many, been so long in coming.'' Government supporters question whether funds will be available to sustain these programs. ''The administration has the right framework for doing this, but long-term success will depend on sustainable resourcing to help local government, communities and law enforcement build initiatives that can have impact,'' said Quintan Wiktorowicz, a former senior White House aide who was one of the principal architects of the current strategy. That strategy here at home, called countering violent extremism, has proved much more difficult for American officials to master than the ability of the Pentagon and spy agencies to identify, track, capture and, if necessary, kill terrorists overseas. --- XT: Muslim-American Cooperation Answers Muslim leaders already cooperating to challenge ISIS recruitment Goodstein, 15 (2/19/2015, Laurie, “U.S. Muslims Take On ISIS’ Recruiting Machine,” http://www.nytimes.com/2015/02/20/us/muslim-leaders-in-us-seek-to-counteract-extremistrecruiters.html?_r=0, JMP) STERLING, Va. — Imam Mohamed Magid tries to stay in regular contact with the teenager who came to him a few months ago, at his family’s urging, to discuss how he was being wooed by online recruiters working for the Islamic State, the extremist group in Syria and Iraq. But the imam, a scholar bursting with charm and authority, has struggled to compete. Though he has successfully intervened in the cases of five other young men, persuading them to abandon plans to fight overseas, the Islamic State’s recruiting efforts have become even more disturbing, he said, and nonstop. “The recruiters wouldn’t leave him alone,” Imam Magid said of the young man he met with recently. “They were on social media with him at all hours, they tweet him at night, first thing in the morning. If I talk to him for an hour, they undo him in two hours.” President Obama on Wednesday described the fight against violent extremism as a “generational challenge” that would require the cooperation of governments, religious leaders, educators and law enforcement. But even before he called on more than 60 nations to join the effort, the rise of the Islamic State and the attacks by homegrown terrorists in Paris, Ottawa, Copenhagen and Sydney, Australia, had jolted American Muslims into action. Muslim leaders here and elsewhere have already started organizing or expanding prevention programs and discussions on countering violent extremism, often with assistance from law enforcement officials and trained counter-recruiters who emphasize that the Internet’s dangers for young Muslims now go far beyond pornography. With the Islamic State in particular deploying savvy online appeals to adolescents alongside videos of horrific executions, the sense of urgency has grown. Though some Muslim leaders still resist cooperating with the government, fearing that they would be contributing to religious profiling and anti-Muslim bigotry, many have been spurred to respond as they have come into contact with religiously ardent youths who feel alienated by life in the West and admit that they have been vulnerable to the Islamic State’s invitation to help build a puritanical utopia. “The number is small, but one person who gets radicalized is one too many,” said Rizwan Jaka, a father of six and the board chairman of the All Dulles Area Muslim Society, where Imam Magid is the spiritual leader. “It’s a balancing act: We have to make sure our youth are not stereotyped in any way, but we’re still dealing with the real issue of insulating them from any potential threat of radicalization.” No uniqueness for their internal link --- moderate Muslims are speaking out now against extremist violence Byman, 15 --- professor in the security studies program at Georgetown University and research director of the Center for Middle East Policy at Brookings (2/13/2015, Daniel, “Five myths about violent extremism,” http://www.washingtonpost.com/opinions/five-myths-about-violent-extremism/2015/02/13/2dc72786- b215-11e4-827f-93f454140e2b_story.html, JMP) ***note --- Byman is listing “myths” about violent extremism and answering them 2. Moderate Muslims need to speak out. Whenever an attack occurs, commentators chide moderate Muslims for not doing enough. Fox News contributor Monica Crowley argued that Muslims “should be condemning” the Charlie Hebdo attack but said that she hadn’t “heard any condemnation.” Bill Maher made a similar point when he claimed that “hundreds of millions” of Muslims “applaud an attack like this.” Impressionable young people should know that their communities reject violence, and Muslims should indeed speak out — and they do. All the time. They condemn specific attacks such as the Charlie Hebdo killings, and they condemn terrorism in general. As the Islamic State emerged, more than 120 Muslim scholars from around the globe issued a point-by-point rebuttal of its religious arguments. One problem for Sunni Islam is that it lacks a single church or spokesperson, so unlike Catholicism or the more hierarchical Shiite Islam, it can’t condemn (or endorse) anything in a categorical way. Blogger Daniel Haqiqatjou mockingly called for an iCondemn app that would allow Muslims to efficiently denounce acts of terror around the globe and reassure non-Muslims as to where they stand. Of course, we shouldn’t hold ordinary people responsible for what violent people do in their name. Catholics should condemn the killing of an abortion doctor, but I don’t blame them for the murder if they don’t. Cooperation now with Muslim communities --- including on the CVE program Audi, 15 (4/20/2015, Tamara, “U.S. Muslim Community Divided Over White House Outreach Plan; Lawenforcement efforts to prevent radicalization provoke both support and suspicion,” http://www.wsj.com/articles/u-s-muslim-community-divided-over-white-house-outreach-plan-1429555173, JMP) *** CVE = plan called Countering Violent Extremism Despite the criticism, government officials say many Muslim communities have embraced the program, such as in Denver and Detroit, especially in the wake of more high-profile prosecutions of young people from the U.S. attempting to join Islamic State. Hennepin County Sheriff Rich Stanek, whose county includes Minneapolis, spoke about his outreach efforts at the White House summit on CVE earlier this year. He and others from his department attend Somali community events several nights a week. His department also hired a Somali refugee to serve as ambassador to the Somali community. Under CVE, Mr. Stanek said he hopes to expand that outreach with more community liaisons to the Somali community. “We’ve built trust and that’s paid off tremendously,” Mr. Stanek said, pointing to the arrests in Minnesota as partly the result of information provided by community members. “This is what community outreach progarms are about.” “People are really worried about” ISIS recruitment, said an administration official. “So if Muslim-American groups are concerned, that’s not the government singling them out. That’s the government responding to their needs.” Another administration official recalled that in meetings with Muslim leaders at the White House earlier this year, President Barack Obama said that “there have been cases in the past that made the community more mistrustful, and said that’s why it’s so important for the community to be more involved.” “The core of this program is building healthy and resilient communities, promoting civic participation,” said Joumana Silyan-Saba of the Los Angeles Human Relations Commission, who worked on L.A.’s CVE. Law enforcement has a role, she said, but the program also calls for beefing up social services for immigrant families. Muslim anti-terror cooperation now Glionna, 14 (11/3/2014, John M., “U.S. Muslim leaders say FBI pressuring people to become informants,” http://www.latimes.com/nation/la-na-muslims-fbi-20141103-story.html, JMP) In Florida, tips from the Muslim community led to the arrest of Sami Osmakac, later convicted of planning a terrorist attack at a Tampa-area nightclub. Osmakac was found guilty in June of attempted possession of a weapon of mass destruction. --- AT: Economic Development & Education Solve Extremism Economic development and education won’t reduce terrorism Byman, 15 --- professor in the security studies program at Georgetown University and research director of the Center for Middle East Policy at Brookings (2/13/2015, Daniel, “Five myths about violent extremism,” http://www.washingtonpost.com/opinions/five-myths-about-violent-extremism/2015/02/13/2dc72786b215-11e4-827f-93f454140e2b_story.html, JMP) ***note --- Byman is listing “myths” about violent extremism and answering them 3. The best response is economic development and education. It seems intuitive that poor people would be angry and that uneducated people would be more susceptible to terrorist brainwashing — a view that conservatives as well as liberals have embraced. President George W. Bush declared that it was important to fight poverty “because hope is an answer to terror.” The 9/11 Commission also called for supporting public education and economic openness. Yet even a moment’s reflection shows the limits of this logic. Billions suffer poverty worldwide, and discrimination and ignorance are tragically widespread, yet few among these billions commit acts of terrorism. Religious schools in Pakistan do educate terrorists, but so do Pakistan’s public schools — and Western universities. Doctors and engineers are well represented in the ranks of international terrorists: Ayman alZawahiri, the current leader of al-Qaeda, is a trained surgeon. Promoting education and economic development is good in its own right — but don’t expect it to combat terrorism. Instead, we should think small, in part because in the West the problem involves small numbers of potential terrorists: thousands, not millions. The focus should be on high-risk communities, both Muslim and nonMuslim. Prisons, for example, are breeders of terrorists, and ensuring that radicals do not dominate religious instruction behind bars and that there are programs (and intelligence agents) in place to stop terrorist recruitment is vital. Particularly important is targeting what terrorism expert William McCants calls “law-abiding supporters” — those who embrace jihadist ideas on social media or are otherwise clearly at risk of joining a terrorist group, but have not yet broken the law. Using community interventions and other means to move these people off the path of violence will prevent the stark choice of jail or Syria, and give family members of potential recruits a reason to seek out government help. --- 1nc Defense – No Impact ISIS not plotting attacks against the West --- surveillance will prevent fighters returning home from carrying out attacks Byman, 15 --- professor in the security studies program at Georgetown University and research director of the Center for Middle East Policy at Brookings (2/13/2015, Daniel, “Five myths about violent extremism,” http://www.washingtonpost.com/opinions/five-myths-about-violent-extremism/2015/02/13/2dc72786b215-11e4-827f-93f454140e2b_story.html, JMP) ***note --- Byman is listing “myths” about violent extremism and answering them 4. The fighting in Iraq and Syria will spawn terrorism in the West. The flow of foreign fighters to Iraq and Syria has understandably alarmed security officials around the world. FBI Director James Comey expressed the views of many when he warned in May 2014 that “there’s going to be a diaspora out of Syria at some point, and we are determined not to let lines be drawn from Syria today to a future 9/11.” But officials raised similar fears about foreign fighters involved in earlier conflicts, especially after the 2003 U.S. invasion of Iraq, and those conflicts did not produce a surge in terrorism in Europe or the United States. Many of the most dangerous foreign fighters die on the battlefield, blowing themselves up in suicide attacks or perishing in firefights. Others opt to continue fighting in the region. And those who return home are likely to be under the surveillance of state security services, inhibiting their ability to carry out attacks. So far the Islamic State’s agenda is first and foremost local and regional — killing Alawites and Shiites, toppling the governments in Iraq and Syria, and so on — not plotting attacks against the West. There remains a real threat, especially from “lone wolf” attacks, as the cachet of the Islamic State inspires Muslims around the world. But such attacks are unlikely to be on the scale of 9/11 or carried out in a sustained way. 1nc Islamophobia / Discrimination Adv ***Note when prepping file --- this particular evidence is referencing an article by Michael Greenwald (https://firstlook.org/theintercept/2014/07/09/undersurveillance/) that claimed Muslim American Leaders were being spied on because of their race, religion, and political views. Their internal link is nearly impossible to prove --- built in checks prevent worst forms of discrimination Harris, 14 --- senior staff writer at Foreign Policy, covering intelligence and cyber security (7/9/2014, Shane, “The FBI’s Dirty Little Secret; The NSA wasn't the only one snooping on ordinary Americans,” http://foreignpolicy.com/2014/07/09/the-fbis-dirty-little-secret/, JMP) ***Mike German is a former FBI agent If the racial and religious profiling allegations prove true, the FBI would not only have broken the law, but it would be guilty of the worst intelligence abuses since the days of COINTELPRO, the covert and occasionally illegal spying programs that targeted American political activists, Vietnam War protesters, civil rights leaders, and even some U.S. government officials for their political associations and views. The ensuing scandal gave birth to the system of privacy laws that govern spying on Americans today. But the article doesn’t provide that evidence. The spreadsheet came from the seemingly endless trove of classified government documents that Snowden, a former NSA contractor, has provided to reporters, including Greenwald. It apparently doesn’t include the individual applications for warrants that Justice Department attorneys may have submitted to the Foreign Intelligence Surveillance Court before collecting the men’s emails. "It is unclear whether the government obtained any legal permission to monitor the Americans on the list," wrote Greenwald and his co-author, Murtaza Hussain. And given that any government justification for spying is presumably classified, "it is impossible to know why their emails were monitored, or the extent of the surveillance," they wrote. And there’s the rub. Absent the underlying presentations that FBI agents and Justice Department lawyers made to the court or to senior U.S. officials, it’s impossible to know what evidence the government believed justified reading the emails of five U.S. citizens. That doesn’t diminish the significance of the story in one respect: It’s practically unheard of for a target of intelligence surveillance to be publicly identified. Usually, the targets themselves never find out. But without clear evidence that the men were spied on because they’re of Muslim heritage, because they spoke out against government counterterrorism policies, or even because they represented individuals or groups accused of terrorism, as one lawyer did, the tale of the FBI spying is unlikely to provoke outrage on Capitol Hill or lead to any significant changes in U.S. surveillance law. To bring more transparency to a historically secretive process, Congress is considering a bill that would require the intelligence surveillance court to hear challenges to the government’s warrant requests from an adversarial attorney, one appointed by the court and allowed to examine classified information. The Intercept story could give ammunition to the backers of that proposal. The story underscores how opaque the court process is to most Americans and even to lawmakers, German said. "There are some issues about the candor involved in these interactions between the government and the court," he added. Government lawyers present their case, based largely off information collected by the FBI or the NSA. But a warrant application, which can number from 50 to 100 pages of material, is never made public, so it’s impossible to publicly evaluate the merits of the government’s argument. That has always been true, however, and is arguably essential to preserve the secrecy of covert intelligence operations. The system also has a significant check, defenders of the process point out: FBI agents and federal prosecutors can go to jail for misrepresenting facts to the court. Supporters of the FBI saw not only an absence of evidence of illegal spying in the Intercept story, but said it was highly unlikely that the government would have based its suspicions of terrorist ties solely on the targets’ public speech or associations. Surveillance court judges, they said, would never approve a warrant based on activities protected by the First Amendment. The Justice Department and the Office of the Director of National Intelligence were quick to categorically deny the central allegations of the monitored men. "It is entirely false that U.S. intelligence agencies conduct electronic surveillance of political, religious or activist figures solely because they disagree with public policies or criticize the government, or for exercising constitutional rights," the agencies said in a joint statement. Without acknowledging that the FBI collected the men’s emails or whether a court approved the spying, the statement noted that the government, except for limited cases like emergencies, must obtain a court order "to target any U.S. citizen or lawful permanent resident for electronic surveillance." And that permission only comes following a showing of "probable cause, based on specific facts … that the person is an agent of a foreign power, a terrorist, a spy, or someone who takes orders from a foreign power," the statement said. The former senior intelligence official said it would be illegal to monitor any of the five men simply because of their jobs or political affiliations. "Someone might be the head of a Muslim organization. But that cannot be the basis for suspicion" used to obtain a surveillance warrant, the former official said. "You have to make the case. You have to have probable cause. It can’t be a fishing expedition." Stewart Baker, who was the NSA’s general counsel in the early 1990s, echoed that prohibition and added that the mere fact of someone’s profession isn’t proof that he was unfairly or illegally targeted. "Just because someone is a senior official at the Council on American-Islamic Relations doesn’t answer the question of whether there’s probable cause" to suspect him of terrorism or espionage, Baker said. "But it’s not proof that he must be a victim of a witch hunt." Ultimately, the FBI may not have to offer any public evidence of why it targeted the five men. Lawmakers on Wednesday showed no immediate signs that they were eager to hold hearings or grill the bureau and the Justice Department on the standards it uses in presenting evidence to the surveillance court — in this case or any others. Rep. Michael Rogers, the chairman of the House Intelligence Committee and a former FBI agent, questioned how one spreadsheet showing a list of email addresses could lead to any definitive answers about FBI spying. "They’re basing conclusions on a slide," Rogers said in an interview. Recent court ruling will increase FBI transparency and accountability ACLU, 15 (3/26/15, “FBI Ordered To Disclose Surveillance Tactics On Muslim Communities; As the FBI has expanded its activities to include generalized monitoring and surveillance, unconnected to any suspected criminal activity, it is critical that records related to those broad surveillance programs be available for public scrutiny,” http://www.mintpressnews.com/fbi-ordered-to-disclose-surveillance-tactics-on-muslimcommunities/203726/, JMP) Today, a federal district court in San Francisco issued an important ruling for government transparency and accountability. Judge Richard Seeborg disallowed the FBI’s attempt to use a “law enforcement exemption” in the Freedom of Information Act to shield from public disclosure details of the agency’s surveillance programs. The case originated in 2010, when—concerned about new FBI initiatives like “domain management” and “threat assessments” that do not require a criminal predicate, as well as intense and sometimes frightening efforts to recruit Muslim community members to become “informants”—the ACLU of Northern California, Asian Americans Advancing Justice – Asian Law Caucus and the San Francisco Bay Guardian filed a Freedom of Information Act request for records relating to FBI surveillance of Northern California’s Arab, Middle Eastern, Muslim and South Asian (“AMEMSA”) communities. Then, with the help of Morrison & Foerster, we filed suit to force release of the records and received over 50,000 pages of documents, many of which revealed troubling practices (see below). But many of those documents were redacted in part, and many others withheld in full, based on a variety of rationales. One asserted justification—the one that was the sole focus of the court’s opinion today—was that the records were “complied for law enforcement purposes,” also called exemption 7. We argued that the documents related to surveillance techniques and activities that did not involve enforcement of a particular federal law could not be withheld based on that exemption. We highlighted records describing training to recruit community members to be “informants” unconnected to any actual criminal investigation, documents describing community outreach efforts, and threat assessment and domain management documents, which by definition do not require a criminal predicate. The court agreed with us and held, “Because the FBI’s explanation of the link between its law enforcement activities and the particular documents withheld fails to meet the [applicable] ‘rational nexus’ standard . . ., the FBI is altogether precluded from withholding information under [the law enforcement exemption].” The court confirmed that “‘generalized monitoring and information-gathering’ are not sufficient justifications to apply Exemption 7.” And, in this case, because the FBI failed to show any additional justification and failed to “tether the activities the withheld documents concern to the enforcement of any particular law,” the court ruled that the FBI cannot rely on Exemption 7 to withhold the documents at issue. This ruling well upholds the purpose of the Freedom of Information Act and its limited law enforcement exemption. Review the documents Documents that we received through this litigation have shed considerable light on FBI’s surveillance activities and biased approach to AMEMSA communities, for example: The FBI used “community” outreach to collect and possibly illegally store intelligence information on Americans’ political and religious beliefs; The FBI engaged in problematic racial profiling and racial “mapping;” The FBI had used Anti-Arab and Anti-Muslim counterterrorism training materials; and The FBI was not as responsive to hate crime complaints from some Northern California AMEMSA communities Impact is overhyped and the only evidence is based on anecdotal claims Tobin, 13 --- Senior Online Editor of Commentary magazine (11/26/13, Jonathan S., “FBI Stats Again Belie Islamophobia Myth,” https://www.commentarymagazine.com/2013/11/26/fbi-stats-again-belieislamophobia-myth/, JMP) When it comes to the question of America’s alleged Islamophobia, there is a consensus in the American media: American Muslims have been under siege since the 9/11 attacks. Every attempt on the part of lawenforcement agencies to probe the growth of homegrown terrorism and the possible incitement to hate and violence being conducted at some mosques, as well as by community groups influenced or controlled by Islamists, is branded as more proof of the allege persecution of Muslims and Arabs. The fact that no proof of discrimination or systematic violence other than anecdotal claims is ever brought forward is disregarded so as not to impinge on the need for Americans to feel guilty about the treatment of Muslims. But with the annual release of the FBI’s hate crime numbers, statistical proof is once again available for those who are interested in the real answer as to which groups are subjected to the most attacks. This year’s numbers, like those of every other previous year since they began compiling such statistics, are clear: Jews remain the No. 1 target of hate crimes in America and no other group comes even close. Incidents involving Muslims, who are, according to the unchallenged meme that is central to every story or broadcast about the subject, the prime targets actually suffer only a fraction as much as Jews. Is it too much to ask reporters who regurgitate the same tired, unproven story lines about Muslims in the coming year to take these facts into account? As in previous years, Jews top the figures for hate crimes, which the FBI claims are down from previous years. Of the 1,340 incidents of anti-religious hate crimes reported, 674 or 62.4 percent were anti-Jewish in nature. Only 130 incidents or 11.6 percent involved Muslim victims. These figures are not much different from those assembled by the government for previous years. In virtually every year, the number of antiSemitic incidents is a multiple of those involving Muslims. It is possible that some anti-Muslim attacks might be categorized as an ethnic issue involving Arabs rather than a religious one. But even if we were to try and take some attacks involving national origins, again the enormous gap between the anti-Semitic incidents and those about Muslims is not bridged. The total number of those attacks involving that category that were not about targeting Hispanics (which make up over 60 percent of that total) was 283 and it is likely that, at best, only some of those were about Muslims or Arabs. It is true that the Anti-Defamation League has criticized the FBI report for trumpeting the overall decline in hate crimes. The ADL rightly points out that hate crimes reporting isn’t mandatory in parts of the country and that the number of agencies funneling figures to the FBI actually declined from 14,500 to 1,3022 in 2012. So it’s likely that there wasn’t any real decline in the number of hate crimes. But there is no proof or any logical reason to believe that this flaw would lead to any underreporting of antiMuslim crimes since the percentage of such incidents in 2012 is essentially the same as in previous years. What does this all mean? First, as much as we should decry all hate crimes and urge those responsible to be prosecuted and harshly punished, no matter who their victims might be, there is no epidemic of such incidents directed at any single group. Though Jews are the most likely victims of religious crimes, no reasonable person can claim that they are under siege or that Jewish life is under attack in any manner in this country. Indeed, as the Pew Survey on American Jews that I discussed in the November issue of COMMENTARY reported, less than 20 percent of Jews have even experienced an anti-Semitic remark, let alone an attack. Anti-Semitism is on the rise around the world and particularly in Europe, but in a nation where a tenth of the U.S. Senate and a third of the U.S. Supreme Court are Jews, its impossible to argue that there are any genuine obstacles to Jewish achievement, let alone a wave of Jew-hatred. Yet, we are asked by the mainstream media to believe that a group which claims to have roughly the same small slice of the national population as the Jews but which, at best, suffers only a fifth of the hate crimes incidents as Jews, is actually laboring under a grievous and discriminatory wave of bias attacks. It not only makes no sense, it is not even remotely congruent with the facts. America isn’t perfect. Hate still exists against religious and ethnic groups, and religious minorities. Yet once again the annual release of FBI statistics debunks the notion of a post 9-11 backlash against Muslims. But don’t expect the liberal mainstream media to notice this or to take it into account when they resurrect the same misleading story lines in the coming year. Doesn’t solve --- most profiling occurs during traffic stops and pat-downs of pedestrians by state and local agents Hannon, 14 (12/8/2014, Elliot, “Justice Department Announces New Limits on Racial Profiling by Law Enforcement,” http://www.slate.com/blogs/the_slatest/2014/12/08/new_limits_on_racial_profiling_by_law_enforcement _announced.html, JMP) The Obama administration released a new set of guidelines on Monday aimed at curtailing the profiling of specific groups by law enforcement. The Justice Department issued the expanded rules prohibiting profiling on the basis of race, religion, national identity, gender, sexual orientation, and gender identity by federal law enforcement—such as the FBI. The new policy broadens the Bush administration's 2003 policy that banned racial and ethnic profiling, except for cases of national security. The new rules, however, “won’t apply to screening at borders and airports, where Department of Homeland Security personnel have long given extra scrutiny to people from certain countries,” the Wall Street Journal reports. “The policy also doesn’t apply to local or state law enforcement, beyond those personnel assigned to federal task forces.” Attorney General Eric Holder ordered the review to the Justice Department policy in 2009 and the new guidlines were announced this week as local police tactics faced enormous criticism following the deaths of Michael Brown and Eric Garner. While the newly announced guidelines extend the restrictions on the use of profiling, “[c]oncerns about racial profiling on the part of civil-liberties groups mostly have to do with traffic stops and pat-downs of pedestrians,” according to the Journal. “Because federal law-enforcement agents rarely engage in those activities, barring them from profiling may have little impact on how and why people are stopped in their everyday lives.” Maximizing all lives is the only way to affirm equality Cummiskey 90 – Professor of Philosophy, Bates (David, Kantian Consequentialism, Ethics 100.3, p 601-2, p 606, jstor) We must not obscure the issue by characterizing this type of case as the sacrifice of individuals for some abstract "social entity." It is not a question of some persons having to bear the cost for some elusive "overall social good." Instead, the question is whether some persons must bear the inescapable cost for the sake of other persons. Nozick, for example, argues that "to use a person in this way does not sufficiently respect and take account of the fact that he is a separate person, that his is the only life he has."30 Why, however, is this not equally true of all those that we do not save through our failure to act? By emphasizing solely the one who must bear the cost if we act, one fails to sufficiently respect and take account of the many other separate persons, each with only one life, who will bear the cost of our inaction. In such a situation, what would a conscientious Kantian agent, an agent motivated by the unconditional value of rational beings, choose? We have a duty to promote the conditions necessary for the existence of rational beings, but both choosing to act and choosing not to act will cost the life of a rational being. Since the basis of Kant's principle is "rational nature exists as an end-in-itself' (GMM, p. 429), the reasonable If I sacrifice some for the sake of other rational beings, I do not use them arbitrarily and I do not deny the unconditional value of rational beings. Persons may have "dignity, an unconditional and incomparable value" that transcends any market value (GMM, p. 436), but, as rational beings, persons also have a fundamental equality which dictates that some must sometimes give way for the sake of others. The formula of the end-in-itself thus does not support the view that we may never force another to bear some cost in order to benefit others. If one focuses on the equal value of all rational beings, then equal consideration dictates that one sacrifice some to save many. [continues] According to Kant, the objective end of moral action is the existence of rational beings. Respect for rational beings requires that, in deciding what to do, one give appropriate practical consideration to the unconditional value of rational beings and to the conditional value of happiness. Since agent-centered constraints require a non-value-based rationale, the most natural interpretation of the demand that one give equal respect to all rational beings lead to a consequentialist normative theory. We have seen that there is no sound Kantian reason for abandoning this natural consequentialist interpretation. In particular, a consequentialist interpretation does not require sacrifices which a Kantian ought to consider unreasonable, and it does not involve doing evil so that good may come of it. It simply requires an uncompromising commitment to the equal value and equal claims of all rational beings and a recognition that, in the moral consideration of conduct, one's own subjective concerns do not have overriding importance. solution to such a dilemma involves promoting, insofar as one can, the conditions necessary for rational beings. No risk of endless warfare Gray 7—Director of the Centre for Strategic Studies and Professor of International Relations and Strategic Studies at the University of Reading, graduate of the Universities of Manchester and Oxford, Founder and Senior Associate to the National Institute for Public Policy, formerly with the International Institute for Strategic Studies and the Hudson Institute (Colin, July, “The Implications of Preemptive and Preventive War Doctrines: A Reconsideration”, http://www.ciaonet.org/wps/ssi10561/ssi10561.pdf) In the hands of a paranoid or boundlessly ambitious political leader, prevention could be a policy for endless warfare. However, the American political system, with its checks and balances, was designed explicitly for the purpose of constraining the executive from excessive folly. Both the Vietnam and the contemporary Iraqi experiences reveal clearly that although the conduct of war is an executive prerogative, in practice that authority is disciplined by public attitudes. Clausewitz made this 7. A policy that favors preventive warfare expresses a futile quest for absolute security. It could do so. Most controversial policies contain within them the possibility of misuse. point superbly with his designation of the passion, the sentiments, of the people as a vital component of his trinitarian theory of war. 51 It is true to claim that power can be, and indeed is often, abused, both personally and nationally. It is possible that a state could acquire a taste for the apparent swift decisiveness of preventive warfare and overuse the option. One might argue that the easy success achieved against Taliban Afghanistan in 2001, provided fuel for the urge to seek a similarly rapid success against Saddam Hussein’s Iraq. In other words, the delights of military success can be habit forming. On balance, claim seven is not persuasive, though it certainly contains a germ of truth. A country with unmatched wealth and power, unused to physical insecurity at home—notwithstanding we ought not to endorse the argument that the United States should eschew the preventive war option because it could lead to a futile, endless search for absolute security. One might as well argue that the United States should adopt a defense policy and develop capabilities shaped strictly for homeland security approached in a narrowly geographical sense. Since a president might misuse a military instrument that had a global reach, why not deny the White House even the possibility of such misuse? In other words, constrain policy ends by limiting policy’s military means. This argument has circulated for many decades and, it must be admitted, it does have a certain elementary logic. It is the opinion of this enquiry, however, that the claim that a policy which includes the preventive option might lead to a search for total security is not at all convincing. Of course, folly in high places is always possible, which is one of the many reasons why popular democracy is the superior form of government. It would be absurd to permit the fear of a futile and dangerous quest for absolute security to preclude prevention as a policy option. Despite its absurdity, this rhetorical charge against prevention is a stock favorite among prevention’s critics. It should be recognized and dismissed for what it is, a debating point with little pragmatic merit. And strategy, though not always policy, must be nothing if not pragmatic. 42 years of nuclear danger, and a high level of gun crime—is vulnerable to demands for policies that supposedly can restore security. But --- XT: Doesn’t Solve State / Locals Plan doesn’t solve state and local officers that commit most of the abuses --- no modelling either Saab, 14 --- Senior Government Relations Analyst at Deloitte (12/8/2014, Maria, “One Step Forward, Two Steps Back: DOJ Profiling Guidance Revisions Fail to Ban Profiling,” http://www.aaiusa.org/blog/entry/one-step-forward-two-steps-back-doj-profiling-guideline-revisions-fail-toa/, JMP) Holder’s new guidelines arrive during a time where law enforcement activities are under intense scrutiny. Conversations regarding immigration reform, border security, and recent events in Ferguson, MO., New York City, and Cleveland not only emphasize the need to address such activities, but also highlight how little these new guidelines will address the real issues at stake. For one thing, the changes will only apply to federal law enforcement agencies, and will not extend to local and state law enforcement officers, which have been the source of a number of related controversies. The Obama Administration hopes that the new guidelines will serve as a possible roadmap for local police to reform their own practices regarding profiling, but this does not ultimately guarantee change on behalf of local police forces that work closely with particularly vulnerable communities. Addressing only federal practices allows discriminatory surveillance to continue at the local level Saab, 14 --- Senior Government Relations Analyst at Deloitte (12/8/2014, Maria, “One Step Forward, Two Steps Back: DOJ Profiling Guidance Revisions Fail to Ban Profiling,” http://www.aaiusa.org/blog/entry/one-step-forward-two-steps-back-doj-profiling-guideline-revisions-fail-toa/, JMP) But profiling will by and large continue to be permitted in cases where national security and border protection are concerned. For example, federal agents are not obligated to abide by the Guidance’s prohibitions within 100-miles of national borders, which includes nearly one-third of the country and places 197.4 million people under potentially arbitrary investigation. TSA officers will also be allowed to stop passengers at airports based on prohibited qualities. The national security exception will also allow for the FBI to continue “mapping” specific communities on the basis of race, religion, and ethnicity, which has been of particular concern to Arab American and American Muslim communities nationwide. Because the guidance is confined to federal law enforcement practices, this does nothing to address the types of discriminatory targeting and surveillance programs that local agencies, such as the New York Police Department, conduct in contravention to numerous constitutionally protected freedoms. --- XT: Util Consequentialism key---their existentialist focus is complicit with evil Isaac 2 --- Professor of Political Science at Indiana-Bloomington, Director of the Center for the Study of Democracy and Public Life, PhD from Yale (Jeffery C., Dissent Magazine, Vol. 49, Iss. 2, “Ends, Means, and Politics,” p. Proquest) As a result, the most important political questions are simply not asked. It is assumed that U.S. military intervention is an act of "aggression," but no consideration is given to the aggression to which intervention is a response. The status quo ante in Afghanistan is not, as peace activists would have it, peace, but rather terrorist violence abetted by a regime--the Taliban--that rose to power through brutality and repression. This requires us to ask a question that most "peace" activists would prefer not to ask: What should be done to respond to the violence of a Saddam Hussein, or a Milosevic, or a Taliban regime? What means are likely to stop violence and bring criminals to justice? Calls for diplomacy and international law are well intended and important; they implicate a decent and civilized ethic of global order. But they are also vague and empty, because they are not accompanied by any account of how diplomacy or international law can work effectively to address the problem at hand. The campus left offers no such account. To do so would require it to contemplate tragic choices in which moral goodness is of limited utility. Here what matters is not purity of intention but the intelligent exercise of power. Power is not a dirty word or an unfortunate feature of the world. It is the core of politics. Power is the ability to effect outcomes in the world. Politics, in large part, involves contests over the distribution and use of power. To accomplish anything in the political world, one must attend to the means that are necessary to bring it about. And to develop such means is to develop, and to exercise, power. To say this is not to say that power is beyond morality. It is to say that power is not reducible to morality. As writers such as Niccolo Machiavelli, Max Weber, Reinhold Niebuhr, and Hannah Arendt have taught, an unyielding concern with moral goodness undercuts political responsibility. The concern may be morally laudable, reflecting a kind of personal integrity, but it suffers from three fatal flaws: (1) It fails to see that the purity of one's intention does not ensure the achievement of what one intends. Abjuring violence or refusing to make common cause with morally compromised parties may seem like the right thing; but if such tactics entail impotence, then it is hard to view them as serving any moral good beyond the clean conscience of their supporters; (2) it fails to see that in a world of real violence and injustice, moral purity is not simply a form of powerlessness; it is often a form of complicity in injustice. This is why, from the standpoint of politics--as opposed to religion--pacifism is always a potentially immoral stand. In categorically repudiating violence, it refuses in principle to oppose certain violent injustices with any effect; and (3) it fails to see that politics is as much about unintended consequences as it is about intentions; it is the effects of action, rather than the motives of action, that is most significant. Just as the alignment with "good" may engender impotence, it is often the pursuit of "good" that generates evil. This is the lesson of communism in the twentieth century: it is not enough that one's goals be sincere or idealistic ; it is equally important, always, to ask about the effects of pursuing these goals and to judge these effects in pragmatic and historically contextualized ways. Moral absolutism inhibits this judgment. It alienates those who are not true believers. It promotes arrogance. And it undermines political effectiveness. Ethical policymaking requires calculation of consequences Gvosdev 5 – Rhodes scholar, PhD from St. Antony’s College, executive editor of The National Interest (Nikolas, The Value(s) of Realism, SAIS Review 25.1, pmuse) the morality of a foreign policy action is judged by its results, not by the intentions of its framers. A foreign policymaker must weigh the consequences of any course of action and assess the resources at hand to carry out the proposed task. As Lippmann warned, Without the controlling principle that the nation must maintain its As the name implies, realists focus on promoting policies that are achievable and sustainable. In turn, objectives and its power in equilibrium, its purposes within its means and its means equal to its purposes, its commitments related to its resources and its resources adequate to its commitments, it is impossible to think at all about foreign affairs.8 Commenting on this maxim, Owen Harries, founding editor of The National Interest, noted, "This is a truth of which Americans—more apt to focus on ends rather than means when it comes to dealing with the rest of the world—need always to be reminded."9 In fact, Morgenthau noted that "there can be no political morality without prudence."10 This virtue of prudence—which Morgenthau identified as the cornerstone of realism— should not be confused with expediency. Rather, it takes as its starting point that it is more moral to fulfill one's commitments than to make "empty" promises, and to seek solutions that minimize harm and produce sustainable results. Morgenthau concluded: [End Page 18] Political realism does not require, nor does it condone, indifference to political ideals and moral principles, but it requires indeed a sharp distinction between the desirable and the possible, between what is desirable everywhere and at all times and what is possible under the concrete circumstances of time and place.11 This is why, prior to the outbreak of fighting in the former Yugoslavia, U.S. and European realists urged that Bosnia be decentralized and partitioned into ethnically based cantons as a way to head off a destructive civil war. Realists felt this would be the best course of action, especially after the country's first free and fair elections had brought nationalist candidates to power at the expense of those calling for inter-ethnic cooperation. They had concluded—correctly, as it turned out—that the United States and Western Europe would be unwilling to invest the blood and treasure that would be required to craft a unitary Bosnian state and give it the wherewithal to function. Indeed, at a diplomatic conference in Lisbon in March 1992, the various factions in Bosnia had, reluctantly, endorsed the broad outlines of such a settlement. For the purveyors of moralpolitik, this was unacceptable. After all, for this plan to work, populations on the "wrong side" of the line would have to be transferred and resettled. Such a plan struck directly at the heart of the concept of multi-ethnicity—that different ethnic and religious groups could find a common political identity and work in common institutions. When the United States signaled it would not accept such a settlement, the fragile consensus collapsed. The United States, of course, cannot be held responsible for the war; this lies squarely on the shoulders of Bosnia's political leaders. Yet Washington fell victim to what Jonathan Clarke called "faux Wilsonianism," the belief that "high-flown words matter more than rational calculation" in formulating effective policy, which led U.S. policymakers to dispense with the equation of "balancing commitments and resources."12 Indeed, as he notes, the Clinton administration had criticized peace plans calling for decentralized partition in Bosnia "with lofty rhetoric without proposing a practical alternative." The subsequent war led to the deaths of tens of thousands and left more than a million people homeless. After three years of war, the Dayton Accords—hailed as a triumph of American diplomacy—created a complicated arrangement by which the federal union of two ethnic units, the MuslimCroat Federation, was itself federated to a Bosnian Serb republic. Today, Bosnia requires thousands of foreign troops to patrol its internal borders and billions of dollars in foreign aid to keep its government and economy functioning. Was the aim of U.S. policymakers, academics and journalists—creating a multi-ethnic democracy in Bosnia— not worth pursuing? No, not at all, and this is not what the argument suggests. But aspirations were not matched with capabilities. As a result of holding out for the "most moral" outcome and encouraging the Muslim-led government in Sarajevo to pursue maximalist aims rather than finding a workable compromise that could have avoided bloodshed and produced more stable conditions, the peoples of Bosnia suffered greatly. In the end, the final settlement was very close [End Page 19] to the one that realists had initially proposed—and the one that had also been roundly condemned on moral grounds. Survival focus inevitable, doesn’t lead to tyranny, and preconditions all other human values Callahan 73 (Daniel, The Tyranny of Survival, p 90-1, AG) in order to remain human, they should not be all that responsive. Or better, they should be responsive only to those survival arguments which manage to integrate the need for survival with a whole range of other human needs, some of Moreover, I would want to argue that, which would risk survival for the achievement of higher values. A beginning can be made toward this integration by noting some of the uses and abuses of the concept of survival. Historically, the uses unless one exists, everything else is in vain. That is why survival, the desire to live, is so potent a force, and why the right to life is such a basic part of any reasonably enlightened social, political and legal system. Politically, particularly in time of war, national survival has been a potent force for mobilization of community effort, transcendence of self-interest, and creation of patriotic spirit. For individuals, the desire to ensure the survival of offspring has been the source of great and selfless sacrifice and the voluntary acceptance of obligation to future generations. Within the private self, a will to live, to survival at all costs has literally kept people alive, starving off a despair which would otherwise have been totally destructive. That individuals, tribes, communities and nations have committed so much will, energy and intelligence to survival has meant that they have survived, and their descendants are present to tell the tale. Nothing is so powerful a motive force, for self or society, as the threat of have been more evident than the abuses. Among the uses are those of a fundamental perception of a biological reality principle: annihilation, nothing so energizing as the necessity to live. Without life, all else is in vain. Leaving aside the question of whether we need more enlightened attitudes toward suicide in our society, which we may, it is still not for nothing that suicide has been looked upon with abhorrence, whether from a religious or a psychological perspective. It seems to violate the most fundamental of human drives, and has always required a special explanation or justification. Extinction irreversibility justifies prioritizing survival Callahan 73 (Daniel, The Tyranny of Survival, p 106-7) At what point in the deterioration should survival become a priority? Observe that I said a priority; it should never become the priority if that means the sacrifice of all other values. But there are surely conditions under which it could become a priority, and a very high one. The most important of those conditions would be the existence of evidence that irreversibility was beginning to set in, making it increasingly impossible to return to the original conditions. --- AT: No Value to Life “No value to life” doesn’t outweigh---prioritize existence because value is subjective and could improve in the future Torbjörn Tännsjö 11, the Kristian Claëson Professor of Practical Philosophy at Stockholm University, 2011, “Shalt Thou Sometimes Murder? On the Ethics of Killing,” online: http://people.su.se/~jolso/HStexter/shaltthou.pdf I suppose it is correct to say that, if Schopenhauer is right, if life is never worth living, then according to utilitarianism we should all commit suicide and put an end to humanity. But this does not mean that, each of us should commit suicide. I commented on this in chapter two when I presented the idea that utilitarianism should be applied, not only to individual actions, but to collective actions as well.¶ It is a well-known fact that people rarely commit suicide. Some even claim that no one who is mentally sound commits suicide. Could that be taken as evidence for the claim that people live lives worth living? That would be rash. Many people are not utilitarians. They may avoid suicide because they believe that it is morally wrong to kill oneself. It is also a possibility that, even if people lead lives not worth living , they believe they do . And even if some may believe that their lives, up to now, have not been worth living, their future lives will be better . They may be mistaken about this. They may hold false expectations about the future.¶ From the point of view of evolutionary biology, it is natural to assume that people should rarely commit suicide. If we set old age to one side, it has poor survival value (of one’s genes) to kill oneself. So it should be expected that it is difficult for ordinary people to kill themselves. But then theories about cognitive dissonance, known from psychology, should warn us that we may come to believe that we live better lives than we do.¶ My strong belief is that most of us live lives worth living. However, I do believe that our lives are close to the point where they stop being worth living. But then it is at least not very far-fetched to think that they may be worth not living, after all. My assessment may be too optimistic.¶ Let us just for the sake of the argument assume that our lives are not worth living, and let us accept that, if this is so, we should all kill ourselves. As I noted above, this does not answer the question what we should do, each one of us . My conjecture is that we should not commit suicide. The explanation is simple. If I kill myself, many people will suffer. Here is a rough explanation of how this will happen: ¶ ... suicide “survivors” confront a complex array of feelings. Various forms of guilt are quite common, such as that arising from (a) the belief that one contributed to the suicidal person's anguish, or (b) the failure to recognize that anguish, or (c) the inability to prevent the suicidal act itself. Suicide also leads to rage, loneliness, and awareness of vulnerability in those left behind. Indeed, the sense that suicide is an essentially selfish act dominates many popular perceptions of suicide. ¶ The fact that all our lives lack meaning , if they do, does not mean that others will follow my example. They will go on with their lives and their false expectations — at least for a while devastated because of my suicide. But then I have an obligation, for their sake, to go on with my life. It is highly likely that, by committing suicide, I create more suffering (in their lives) than I avoid (in my life). Disad Links Politics DA Links The plan will be contentious --- Congress has consistently demonstrated an antiMuslim attitude Haqiqatjou, 15 (1/22/2015, Daniel, “Congress Doesn’t Applaud Muslim Tolerance – Are We Surprised?” http://muslimmatters.org/2015/01/22/congress-doesnt-applaud-muslim-tolerance-are-wesurprised/, JMP) Trust me, Congress. The feeling is mutual. By now, we have all seen it. During the State of the Union, President Obama called for a rejection of offensive Muslim stereotypes. Instead of applauding approval, the crowd went dead silent. As far as we can tell, Congress and the other government officials who were in attendance are perfectly fine with offensively stereotyping Muslims. My question is, are we really surprised? Let's take a look at a brief list of facts in order to gauge how Muslim-friendly Congress and the US government at large have been over the years. 1. This is the same Congress and the same President that have initiated and continued the “War on Terror,” backing military operations in seven different Muslim nations over the past fourteen years: Afghanistan, Iraq, Libya, Somalia, Yemen, Syria, North West Pakistan. In the few Muslim nations that have not been subjected to direct assault, the US has supported brutal dictators (Egypt, the Gulf) or perpetuated punitive sanctions (Iran, pre-invasion Iraq). The loss of innocent life in these parts of the Muslim world is beyond tallying. To add insult to injury, the instability caused by the “War on Terror” has directly led to the rise of brutal warlords and radical groups, like ISIS, which predominantly kill Muslims. 2. Did you know that as of 2014, there are eight US states that ban Shariah law? Did you know that 34 states have considered banning Shariah just in the past five years? 3. Some Muslims have praised President Obama for speaking against offensive Muslim stereotypes in the State of the Union address. But, let's not overlook the fact that right before the Muslim stereotypes line, Obama said, “As Americans, we respect human dignity, even when we're threatened, which is why I've prohibited torture and worked to make sure our use of new technology like drones is properly constrained.” Is it not interesting that he references two programs that have disproportionately affected Muslims? Many will argue that Obama's drone program is anything but “constrained,” considering the hundreds of civilians killed to date, as well as the brutal tactic of “double tapping” strike targets. Also, it is inaccurate for Obama to claim that he has “prohibited torture.” Torture was prohibited by President Reagan in 1988 when he signed the UN General Assembly's Conventions Against Torture. In light of the CIA Torture Report, Obama is violating international law by not prosecuting those in the Bush Administration who authorized torture. 4. On that point, let's not forget the recent CIA Torture Report and how the victims of CIA torture were, again, predominantly Muslim, many of whom were not even suspected of any wrongdoing. So far, neither President Obama nor Congress has felt the need to prosecute the perpetrators of these crimes against humanity. Again, failing to prosecute torturers is itself a crime according to international law. 5. Also mentioned in the State of the Union was good ol' Guantanamo. Obama promised to shut it down. We can only wonder if this latest promise will be as hollow as the promise he made as a presidential candidate in 2008. Be that as it may, the fact remains that the majority of Gitmo prisoners are Muslims who have not been charged with any crime, yet have had to endure torture and all manner of barbarity. 6. The 2011 Congressional hearing on “domestic Islamic terrorism” is a great example of how many key members of Congress have viewed the American Muslim community and Muslims at large. The House Committee on Homeland Security, which orchestrated this farce, was accused of “Muslim McCarthyism” by implying that all Muslims are loosely responsible for terrorism. Rep. Peter King went so far as to question the legitimacy of CAIR, i.e., the most important legal advocacy group the American Muslim community has. Of course, we were all left wondering, what is the grave “domestic Islamic terrorism” threat Congress is so concerned about, since the vast majority of domestic terrorism in the US is not conducted by Muslims. The FBI itself reports that, between 1980 and 2005, there were more Jewish acts of terrorism within the United States than Muslim (7% vs. 6%). In light of this fact and others, multiple university studies have concluded that the threat of American Muslim terrorism is greatly exaggerated. Hmm, who could possibly benefit from this overt stigmatization of Muslims? 7. How about NYPD illegal surveillance of Muslims? Just your everyday racial profiling run amok, putting hundreds of thousands of innocent American Muslims under the pressure of unfounded suspicion. But what did the federal government have to say? Well, John Brennan, Obama's Homeland Security adviser at the time praised the program. Obama himself praised Ray Kelly, the NYPD commissioner who oversaw Muslim surveillance, and in 2013 strongly considered appointing him as Secretary of Homeland Security. 8. Another major federal agency is the FBI. Perhaps you have heard of the FBI's entrapment program, known best for foiling terror plots of its own making. According to a report published by Project SALAM, nearly 95% of terror related arrests post 9/11 have been the result of the FBI foiling terror plots of its own making. As the report describes: “The government uses agents provocateur to target individuals who express dissident ideologies and then provides those provocateurs with fake (harmless) missiles, bombs, guns, money, encouragement, friendship, and the technical and strategic planning necessary to see if the targeted individual can be manipulated into planning violent or criminal action.” I highly encourage people to peruse all the different cases of Muslim entrapment over the years as the details are often unbelievable. Some have even reported on how the FBI and other agencies use “outreach” programs to spy on the Muslim community. As far as the Obama Administration is concerned, Attorney General Eric Holder of the DOJ has expressed support for the FBI's tactics with respect to the Muslim community. 9. It hardly requires mention, but surely we cannot overlook President Obama demanding, in an address to the UN last year, that Muslims denounce ISIS and radical Islamic ideologies. As myself and many other commentators have repeatedly explained, requiring Muslims as a collective to apologize for and denounce the crimes of a deranged few to which we have no connection is nothing other than racist stereotyping. Even comedian Aziz Ansari made this simple point on Twitter, but apparently our President and much of Congress are too dense to understand this. If Obama wants us to reject offensive Muslim stereotypes, he should start with himself. 10. Remember the “Ground Zero Mosque”? How many members of Congress actively condemned it back in 2010? Quite a few, actually. Obama did make some tepid comments in support of Park51 initially but quickly backtracked and stated: “I was not commenting and I will not comment on the wisdom of making the decision to put a mosque there.” So much for offensive Muslim stereotypes. 11. So, we have covered the CIA, the FBI, the DOJ, the Department of Homeland Security. How about the NSA? Do they have a disproportionate interest in Muslims? Why, yes indeed! As the Snowden leaks detail, the NSA has been datamining the communications of Muslim leaders and activists for years. 12. We would be remiss not to mention the Israeli Lobby and the US government's undying support for every crime and act of genocide that that nation commits, despite the fact that Israel has more spies in the US than any other country. The fact that Palestinians are majority Muslim I'm sure has no impact on influencing how congressmen view Muslims in general, given that those same congressmen grovel at the feet of their Zionist handlers. Let's be real. Anyway, this brief list merely scratches the surface. An entire five volume set could be written cataloging the depth and breadth of US policy disproportionately and negatively impacting Muslims in America and abroad, causing all manner of death, destruction, detention, bullying, and violence in the past 14 years alone. And it is no secret that Islamophobia and riling people up with anti-Muslim fervor is quite lucrative for everyone involved. So, no, it is not a surprise that Congress withheld applause for Muslims. At least they were consistent, unlike President Obama, who, as always, waxes poetic about tolerance, acceptance, mutual understanding, etc., while his policies, in effect if not intent, are diametrically opposed to those ideals. --- XT: Politics Links The plan will be contentious --- there is political division over the issue Mint Press, 13 (4/23/2013, Mint Press News Desk, “Ellison Fights Back Against Calls For Police Surveillance Of Muslim American Communities,” http://www.mintpressnews.com/ellison-fights-backagainst-calls-for-police-surveillance-of-muslim-american-communities/61575/, JMP) “This individual came to the attention of the FBI because of things he said and things he did. That’s appropriate. What should not be cause for alarm is somebody’s status as a member of a particular religious faith or how devout they may happen to be,” Congressman Keith Ellison (D-Minn.) said in an interview this week with Tamron Hall on MSNBC. Ellison was speaking about the recent arrest of Dzhokhar Tsarnaev, the sole surviving Boston bombing suspect who is being held in police custody and charged with crimes that could carry the death penalty if he is convicted. Ellison, one of only two Muslims elected to the U.S. Congress, has tried to stave off the onslaught of accusations against Muslims living in the U.S., pitting himself against other elected officials calling for broad FBI surveillance of Muslim communities. “Ninety-nine percent of the Muslims are outstanding Americans,” said Rep. Peter King (R-N.Y.) on “Fox News Sunday.” “The fact is, that’s where the threat is coming from. When the FBI was after the Westies, they went to the Irish community. When they were after the mafia, they went to the Italian community. If you know a certain threat is coming from a certain community, that’s where you have to look.” The FBI and U.S. police departments began broad surveillance of mosques and Muslim communities in the aftermath of the Sept. 11, 2001 attacks, a method some believe has unfairly targeted a group of people for their religious affiliation and physical appearance. “All Americans should be concerned,” said New York City Democratic Councilmember Daniel Dromm after the release of “Mapping Muslims,” a report issued by the Muslim American Civil Liberties Coalition, the Asian American Legal Defense and Education Fund and the Creating Law Enforcement Accountability & Responsibility (CLEAR) project last month. “The policing that’s going on now encourages mistrust or distrust within the Muslim community. It is not good policing.” These rights groups claim that the NYPD has targeted Muslim communities around the city. The report alleges that since 2001, the NYPD “has mapped, monitored and analyzed American Muslim daily life throughout New York City, and even its surrounding states.” In the present case, some elected officials are calling for similar surveillance techniques for Muslim communities in the wake of the bombings and shootings that killed four and injured 170. Ellison has led the pushback in Congress against expanding surveillance based upon religion or physical appearance, saying, “In all these cases, where you see acts of radicalized individuals using violence, they may have a religious affiliation, but oftentimes, when they give reasons for why they did what they did, it is politics.” He added, “The FBI did not go after all Italians or all Irish people. No one ever said let’s surveil a whole ethnic community. They went after people who were criminals and who were exhibiting criminal behavior … To say that because of the Westies that every Irish person was under suspect; Everyone in America knows that is ridiculous. But still, [King] wants to cast a wide net with regard to Muslims.” The plan will be contentious --- there is congressional division on the issue Gentilviso, 13 (4/28/2013, Chris, “Peter King, Keith Ellison Spar Over Muslim Community Views (VIDEO),” http://www.huffingtonpost.com/2013/04/28/peter-king-keith-ellison_n_3175292.html, JMP) Reps. Peter King (R-N.Y.) and Keith Ellison (D-Minn.) clashed on Sunday over the idea of using surveillance in America's Muslim communities. One week after stressing the need to go after known threats from "a certain community," King reinforced that notion, specifically questioning the FBI's decision to not speak to Boston police about now deceased bombing suspect Tamerlan Tsarnaev. Ellison recognized the need for public safety. But he sees it as "ineffective law enforcement to go after a particular community." “Once you start saying we’re going to dragnet or surveil a community, what you do is you ignore dangerous threats that are not in that community and you go after people who don’t have anything to do with it," Ellison said. Ellison pointed to events in the past and present, notably the recent string of ricin letters in Washington and historic example of Japanese Americans in World War II. King scoffed at that latter comparison, saying that "no one is talking about internment." Terrorism DA Links New profiling rules preserves FBI flexibility to fight terrorism --- broader restrictions will wreck mission effectiveness Apuzzo, 14 (4/9/2014, Matt, “Profiling Rules Said to Give F.B.I. Tactical Leeway,” http://www.nytimes.com/2014/04/10/us/profiling-rules-said-to-give-fbi-tactical-leeway.html?_r=0, JMP) WASHINGTON — Attorney General Eric H. Holder Jr.’s long-awaited revisions to the Justice Department’s racial profiling rules would allow the F.B.I. to continue many, if not all, of the tactics opposed by civil rights groups, such as mapping ethnic populations and using that data to recruit informants and open investigations. The new rules, which are in draft form, expand the definition of prohibited profiling to include not just race, but religion, national origin, gender and sexual orientation. And they increase the standards that agents must meet before considering those factors. But they do not change the way the F.B.I. uses nationality to map neighborhoods, recruit informants, or look for foreign spies, according to several current and former United States officials either involved in the policy revisions or briefed on them. While the draft rules allow F.B.I. mapping to continue, they would eliminate the broad national security exemption that former Attorney General John Ashcroft put in place. For Mr. Holder, who has made civil rights a central issue of his five years in office, the draft rules represent a compromise between his desire to protect the rights of minorities and the concern of career national security officials that they would be hindered in their efforts to combat terrorism. The Justice Department has been reworking the policy for nearly five years, and civil rights groups hope it will curtail some of the authority granted to the F.B.I. in the aftermath of the 9/11 terrorist attacks. Muslims, in particular, say federal agents have unfairly singled them out for investigation. The officials who described the draft rules did so on the condition of anonymity because they were not authorized to discuss them. Mr. Holder, who officials say has been the driving force behind the rule change, gave a personal account of racial profiling on Wednesday before the National Action Network, the civil rights group founded by the Rev. Al Sharpton. “Decades ago, the reality of racial profiling drove my father to sit down and talk with me about how, as a young black man, I should interact with the police if I was ever stopped or confronted in a way I felt was unwarranted,” he said. Throughout the review process, however, the attorney general and his civil rights lawyers ran up against a reality: Making the F.B.I. entirely blind to nationality would fundamentally change the government’s approach to national security. The Bush administration banned racial profiling in 2003, but that did not apply to national security investigations. Since then, the F.B.I. adopted internal rules that prohibited agents from making race or religion and nationality the “sole factor” for its investigative decisions. Civil rights groups see that as a loophole that allows the government to collect information about Muslims without evidence of wrongdoing. Intelligence officials see it as an essential tool. They say, for example, that an F.B.I. agent investigating the Shabab, a Somali militant group, must be able to find out whether a state has a large Somali population and, if so, where it is. As written, the new rules are unlikely to satisfy civil rights groups and some of the administration’s liberal allies in Congress. Senator Richard J. Durbin, Democrat of Illinois, has said the existing rules “are a license to profile.” The Justice Department rules would also apply to the Drug Enforcement Administration, and the Bureau of Alcohol, Tobacco, Firearms and Explosives, but it is the F.B.I. that takes the lead on most national security investigations. Farhana Khera, the president of Muslim Advocates, said expanding the rules to cover nationality and religion would be a significant step forward. But she opposed any rule that allowed the F.B.I. to continue what it calls “domain mapping” — using census data, public records and law enforcement data to build maps of ethnic communities. Agents use this data to help assess threats and locate informants. “It would certainly mean we have work to do,” said Ms. Khera, who was one of several rights advocates who met with Mr. Holder about the profiling rules last week. “We want an effective ban on all forms of profiling.” Before federal agents could consider religion or other factors in their investigations under the new rules, they would need to justify it based on the urgency and totality of the threat and “the nature of the harm to be averted,” according to an official who has seen the draft. That would not prevent agents from considering religion or nationality, but officials said the goal was to establish clear rules that made doing so rare. Department officials were prepared to announce the new rules soon and had told Congress to expect them imminently. But recently, the White House intervened and told Mr. Holder to coordinate a larger review of racial profiling that includes the Department of Homeland Security, officials said. That is significant because the Bush-era racial profiling rules also contained an exception for border investigations, which are overseen by the department. Hispanic advocacy groups are as opposed to that caveat as Muslims are to the exception for national security investigations. Mr. Holder cannot tell Homeland Security what rules to follow. But he has told colleagues that he believes border agents can conduct their investigations without profiling and by following the same rules as the Justice Department, one law enforcement official said. It is not clear how long this broader review will take, but for now it has delayed release of the Justice Department rules. Relations between the F.B.I. and Muslims have at times been strained since the weeks after 9/11, when agents arrested dozens of Muslim men who had no ties to terrorism. Since then, the F.B.I. has adopted new policies and invested heavily to explain them to Muslim populations. Senior agents speak at mosques and meet regularly with imams and leaders of Muslim nonprofit groups, but suspicions remain. Internal F.B.I. documents revealed that agents used their relationship-building visits at mosques as a way to gather intelligence. Leaked training materials, which the F.B.I. quickly disavowed, described the Prophet Muhammad as a cult leader and warned that mainstream Muslims shared the same “strategic themes” as terrorists. The draft rules would establish a program to track profiling complaints. The current process is less organized, making it difficult to track patterns in complaints or how they are resolved. Surveillance of Muslim communities key to prevent terrorism Lengell, 15 (1/7/2015, Sean, “Peter King: Surveillance of Muslim community vital for national security,” http://www.washingtonexaminer.com/peter-king-surveillance-of-muslim-community-vital-for-nationalsecurity/article/2558311, JMP) Rep. Peter King said Wednesday’s attack on a Paris newspaper that killed a dozen people highlights the need for enhanced police surveillance in Muslim communities to help combat terrorism. “It shows us that we should put political correctness aside and realize that it is important to have police in the communities to be using sources, to be using informers,” the conservative New York Republican told Fox News on Wednesday. “Let's face it. The threat is coming from — for the most part, it's coming out of the Muslim community. It's a small percentage, but that's where it's coming from.” King said law enforcement spying of certain ethnic communities is nothing new, saying that police for decades have used such tactics to combat the Italian-American Mafia and the Westies, a gang that sprang from New York City's Irish-American community in the 1960s. “We have to be able to go in there and find out what's happening so we can be tipped off and not stand back and treat all communities as if they're the same,” he said. "If it's Islamist terrorism, we have to have more surveillance in those communities.” The Associated Press reported that three masked gunmen shouting "Allahu akbar!" stormed the Paris offices of the satirical weekly newspaper Charlie Hebdo, killing 12 people, including its editor, before escaping in a car. The publication's caricatures of the Prophet Muhammad have frequently drawn condemnation from Muslims. King said that while it’s uncertain if enhanced surveillance could have stopped the Paris shooting, “it shows the absolute necessity” of “on-the-ground intelligence. “You can't provide security for every soft target in a major city. But if you have surveillance, if you're in the community, if you have informers, that shows how essential this [is], like the NYPD's been doing over the years,” he said. Terrorism DA Link Uniqueness Recent DOJ guidelines won’t result in any changes to FBI practices and still permits surveillance in critical areas Phelps, 14 (12/9/2014, Timothy M., “Comey says new profiling guidelines will have no effect on the FBI,” http://www.latimes.com/nation/la-na-fbi-comey-profiling-20141209-story.html, JMP) The new Justice Department guidelines governing profiling by federal law enforcement officers will have no effect on FBI practices, its director, James B. Comey, said Tuesday. On Monday, Comey’s boss, Atty. Gen. Eric H. Holder Jr., said the new guidelines were “a major and important step forward to ensure effective policing by federal law enforcement officials.” But at a press briefing Tuesday, Comey said that the FBI, the lead federal law enforcement agency, is already in compliance with the new guidelines and strongly asserted that no changes were required. The guidelines “don’t have any effect on the FBI,” he said Asked whether the new guidance would change anything to FBI does now, Comey said, “No, nothing. It doesn’t require any change to our policies or procedures.” He said the FBI field manual for agents would not be changed because it was already in compliance with the guidelines, which expand restrictions on racial and ethnic profiling to cover religion, national origin, sexual orientation and gender identity. He defended the FBI practice of “mapping” communities to identify neighborhoods by race, religion or national origin. Civil rights leaders were critical Monday of the failure of the Justice Department to curtail the practice. “We need to be able to understand the communities we serve and protect,” Comey said. “When there is a threat from outside the country, it makes sense to know who inside the country might be able to help law enforcement.” “It is about knowing the neighborhoods: what’s it like, where’s the industry, where are the businesses, are there particular groups of folks who live in a particular area?” Despite shortcomings, recent review demonstrates FBI’s effectiveness because of unfettered surveillance Ackerman, American national security reporter and blogger, national security editor for the Guardian, and Yuhas, 15 (3/25/2015, Spencer & Alan, The Guardian, “FBI told its cyber surveillance programs have actually not gone far enough; In-house 9/11 Review Commission calls for further expansion of informant and cyber surveillance networks but largely ignores domestic intelligence gathering,” Lexis, JMP) An in-house review of the FBI has found the agency failing to go far enough in its expansion of physical and cyber surveillance programs, urging the bureau to recruit deeper networks of informants and bring its technological abilities up to pace with other intelligence agencies. While billed as a damning critique of the FBI, the in-house assessment known as the 9/11 Review Commission primarily attacks the bureau for not moving fast enough to become a domestic intelligence agency, precisely the direction in which the FBI has pivoted since the 2001 terror attacks. The majority of the panel's findings recommend bureaucratic changes - such as expanded training for FBI intelligence analysts or expanding cooperation with local and state law enforcement through the agency's Joint Terrorism Task Force - or otherwise urge Director James Comey onward in the long-set course he and predecessor Robert Mueller have set, such as bolstering the FBI's "human intelligence" (Humint) network of informants. In particular, the report found that the agency fails to support analysts and linguists who interpret intelligence behind the scenes. The "imbalance" between support for field agents and analysts "needs urgently to be addressed to meet growing and increasingly complex national security threats, from adaptive and increasingly tech-savvy terrorists, more brazen computer hackers, and more technically capable, global cyber syndicates", the report's authors wrote. Yet the "Review Commission cannot say that with better JTTF collaboration, Humint or even intelligence analysis that the FBI would have detected those plots beforehand", the panel concedes, offering only that FBI counterterrorism "might have benefited" with an acceleration of what the agency has already been doing. Much of the report remarked approvingly on the FBI's activities of the past decade, praising the way it shares information with government agencies and the new rules that allow it to surveil a target without a warrant. "With the new and almost entirely unclassified AG Guidelines, special agents working on national security issues could now at the assessment stage 'recruit and task sources, engage in interviews of members of the public without a requirement to identify themselves as FBI agents and disclose the precise purpose of the interview, and engage in physical surveillance not requiring a court order' just as special agents working on organized crime investigations could do," the authors wrote. Administrative Law CP Notes Given how well this counterplan clashes with the FBI political and religious surveillance aff, you probably don’t need to risk competition issues by including “propose [the plan]” in text. You can credibly say that the two mandates resolve civil liberty concerns. 1nc Administrative Law CP The United States federal government should propose [the plan] but require that: The Attorney General or FBI Director provide both notice of a decision to amend the Attorney General's Guidelines for Domestic FBI Operations or the Domestic Investigations and Operations Guide and written justifications for their ultimate decisions. Any changes to the Guidelines regime be accompanied by a binding "Civil Liberties Impact Statement" prepared by the Justice Department, and that the Privacy and Civil Liberties Oversight Board be given veto power in the process of drafting or modifying the Guidelines and their implementing regulations. The counterplan solves the case and still preserves the FBI’s decision-making role and expertise to prevent terrorism Berman, 14 --- Visiting Assistant Professor of Law, Brooklyn Law School (Winter 2014, Emily, Washington & Lee Law Review, “Regulating Domestic Intelligence Collection,” 71 Wash & Lee L. Rev. 3, Lexis, JMP) A recent quote from former Director of National Intelligence Mike McConnell captures the sentiment of many security policymakers. In his view, the American people have "very little appreciation for the threat," and "special interests, particularly civil liberty groups with privacy concerns," prevent the intelligence community from doing its job as well as it otherwise could. n153 This view of the need to consider privacy concerns as a [*41] hurdle to effective policy, rather than as an integral part of policymaking, illustrates the tension that sometimes arises between the FBI's primary mission and its responsibility to protect civil liberties. As others have pointed out, the FBI will value success in carrying out its primary mission and will favor terrorism prevention "over competing concerns such as the protection of civil liberties." n154 Pointing out the elevation of the FBI's anti-terrorism mission over other considerations is not meant to be an indictment. That mission is a vital one that should be pursued vigorously. And with over a century of experience conducting criminal and security investigations, the FBI is the agency in the best position to determine the most effective means of pursuing that mission. This includes decisions regarding which investigative methods will be most successful in countering threats to the country. This expertise should not be undervalued. At the same time, the decision about what level of intrusiveness society is prepared to accept in pursuit of security is not a matter of technical, investigative, or intelligence-collection expertise. Determining the intrusiveness of an investigation justified by any particular set of circumstances necessarily involves normative judgments implicating fundamental values. As should now be clear however, the only true constraints on the FBI's intelligence-collection activities are the Guidelines and the DIOG. This leaves decisions regarding the appropriate balance between the FBI's security mission and the interests on the other side of the scale in the hands of the Attorney General. He, in turn, has delegated many of those [*42] decisions to the FBI itself. Thus, concerns over security will have a prominent role in such decision making and other interests will be short-changed. III. Administrative Strategies as Governance If the usual tools of governance fail to apply effectively to the Guidelines and the DIOG, how do we devise mechanisms to fill this governance gap? This Part argues that we can borrow from the institutional design principles of the administrative state to address three specific challenges presented by the Guidelines regime. First, the absence of both doctrinal and practical limits on the FBI's intelligence collection confers expansive discretion on the Attorney General and the FBI. Second, the lack of judicial, legislative, or public scrutiny of FBI policy results in a deficit of both accountability and democratic legitimacy. And third, the FBI's focus on threat prevention creates a risk that its rulemaking decisions will give insufficient attention to liberty and privacy interests. With respect to each of these challenges, this Part identifies strategies the administrative state employs, and uses those strategies to develop concrete suggestions to improve intelligence-collection governance. This examination of administrative law strategies--designed to channel discretion, increase accountability and legitimacy, and ensure that competing priorities are afforded sufficient attention-suggests the following concrete reform proposals. First, a reason-giving framework should be implemented that (1) requires the Attorney General to provide notice of his or her intention to modify the Guidelines; and (2) specifies that any modifications must be justified in writing. n155 Second, to promote meaningful pluralist input, the Attorney General should be obligated to consider as part of the Guidelines-development process the views of stakeholders outside the intelligence community (though not necessarily outside the government). n156 Third, in order to ensure liberty interests are not marginalized, [*43] (1) the Justice Department should be required to prepare a statement indicating the likely impact on civil liberties of any changes to the Guidelines, and (2) the Privacy and Civil Liberties Oversight Board should be empowered to participate meaningfully in the Guidelines' development. n157 Before beginning the analysis that suggests these particular reforms, however, a few preliminary points are in order. 2nc Must Read for Net Benefits & Solvency *** CP is a distinct process that avoids our net benefits because it doesn’t require FBI to cede any particular powers or to discontinue existing policy, BUT it solves better because adopting the procedural framework will result in better substantive rules. The counterplan boosts FBI transparency, consistency, fairness, and accountability and ensures public confidence. Berman, 14 --- Visiting Assistant Professor of Law, Brooklyn Law School (Winter 2014, Emily, Washington & Lee Law Review, “Regulating Domestic Intelligence Collection,” 71 Wash & Lee L. Rev. 3, Lexis, JMP) ***Note – APA = Administrative Procedure Act [*46] Given the appropriate political environment, there are at least three reasons to think that the imposition of a framework like the one suggested here is not entirely implausible. As an initial matter, there is the FBI's concern over legitimacy. The Bureau's ability to succeed in its mission requires constructive relationships with the communities in which it operates. n168 Yet its aggressive intelligence-collection tactics-and their concentration in Muslim communities--has alienated many members of that community, raised suspicion and distrust of the Bureau in some quarters, and undermined cooperative relationships. n169 Improved governance is thus not the only benefit that would flow from implementing APA-like procedures; institutionalizing rulemaking procedures would also yield improvements in community relations, public perceptions of legitimacy, and consequently, FBI effectiveness. In addition, government documents and scholarly commentary are replete with arguments about the value of process in legitimating government action. n170 The FBI's practice of reaching out to nongovernmental organizations in anticipation of issuing new intelligence-collection rules indicates an awareness of the benefits of generating the support of outside stakeholders. n171 Subjecting itself to a set of procedural rules would go far in this regard. And finally, none of the proposals here are substantive. They do not call upon the FBI to cede any particular powers, or to discontinue existing policy. Indeed, they acknowledge the Attorney General's and FBI's role in generating the rules by which the FBI operates, so long as they can show [*47] both that changes in the FBI's authority are needed and that the proposed changes are reasonable ones. And finally, when it comes to imposing limits on government actors, broad procedural frameworks often face less opposition than substantive policy changes. n172 A second preliminary note concerns the role of the APA. While several of the proposed reforms are inspired by provisions of the APA, this Article does not argue that the APA's procedural rules apply to the FBI as a matter of binding law. n173 In fact, it does not take a position with respect to whether the Guidelines or the DIOG constitute legislative rules subject to APA requirements, or whether they represent informal guidance documents or "rules of agency organization, procedure, or practice," which are explicitly exempt from many of the APA's constraints. n174 Instead, the Article looks to the way the APA and other sources of administrative law address particular concerns and argues that intelligence-collection governance would benefit from implementing procedures inspired the animating principles behind these sources of administrative law. The idea of imposing a governance framework on the development of rules in the absence of a statutory requirement to do so is not a novel one. The Office of Management and Budget (OMB)--part of the Executive Office of the President tasked with overseeing the regulatory decisions of administrative agencies n175--in its Final Bulletin for Agency Good Guidance Practices "establishes policies and procedures for the development, issuance, and use of significant guidance [*48] documents." n176 These policies are designed to increase the quality, transparency, consistency, fairness, and accountability of agency guidance practices. n177 To that end, the Bulletin suggests that agencies engage in "procedures similar to APA noticeand-comment requirements" for some types of guidance documents in order to "increase the quality of the guidance and provide for greater public confidence in and acceptance of the ultimate agency judgments." n178 Similar language appears in the Department of Homeland Security's (DHS) official guidance on preparing Privacy Impact Assessments (PIAs), n179 which all agencies--including the FBI--must generate for any substantially revised or new Information Technology System that collects, maintains, or disseminates personally identifiable information from or about members of the public. n180 According to the DHS Guidance, requiring agencies to follow procedures designed to call attention to issues of legitimacy "demonstrates to the public and to Congress" that the new systems "have consciously incorporated privacy protections." n181 In other words, both OMB and DHS policy takes the position that procedural constraints result in both better substantive rules and an increase in the perceived legitimacy of those rules, even when those constraints are selfimposed rather than statutorily required. 2nc Terrorism NB Continued congressional delegation to the FBI is necessary for counter-terrorism effectiveness Berman, 14 --- Visiting Assistant Professor of Law, Brooklyn Law School (Winter 2014, Emily, Washington & Lee Law Review, “Regulating Domestic Intelligence Collection,” 71 Wash & Lee L. Rev. 3, Lexis, JMP) The accountability gap left by the absence of judicial review will not be filled by legislative or public scrutiny. The origin story of the original Attorney General Guidelines included a significant role for Congress. n121 Having been prompted by the Church [*35] Committee's findings of misconduct and the resulting public outrage, the legislature was intimately involved in developing the contents of the Guidelines. n122 Congress held a series of hearings on the issue over the course of several years, and saw its suggestions ultimately reflected in the Levi Guidelines. n123 Given that the Guidelines were implemented, at least in part, to avoid more stringent legislative action, n124 this is not a surprise. Surely Attorney General Levi knew that if the rules he instituted did not appear to address Congress's concerns, they would fail to sap the momentum for enacting a statutory charter for the FBI. The contemporary political economy of congressional oversight in this area means that legislative oversight will not provide any more effective a check than judicial action. Legislators' incentives weigh against aggressive involvement. The downside risks of unsuccessful counterterrorism policies (additional attacks) are high. n125 If those policies are developed outside of the legislative process, Congress can share (if not entirely evade) blame. Moreover, counterterrorism policy "is a subject matter that is especially prone to legislative delegation because it often entails hard trade-offs," which are the types of questions Congress is least likely to address. n126 In addition to undermining legislative involvement in counterterrorism policy formulation, existing institutional features also render [*36] congressional oversight of domestic intelligence-collection policy ineffectual. Congress, of course, retains oversight authority over the FBI. n127 If it wants to play a more active role in overseeing the Guidelines, it has the tools to do so. n128 After all, Congress determines whether and to what degree the FBI's intelligence-collection activities are funded. n129 Moreover, the relevant committees of jurisdiction conduct regular oversight hearings at which the Attorney General and FBI Director appear. n130 Legislators can ask Justice Department and FBI officials for information about the Guidelines or the FBI's activities at any time. n131 Administrative governance balance competing missions so security is not undermined Berman, 14 --- Visiting Assistant Professor of Law, Brooklyn Law School (Winter 2014, Emily, Washington & Lee Law Review, “Regulating Domestic Intelligence Collection,” 71 Wash & Lee L. Rev. 3, Lexis, JMP) [*66] D. Reconciling Conflicting Missions Administrative governance also has developed ways to address the challenges posed when agencies are responsible for pursuing multiple, competing goals. The FBI must carry out its mission of preventing security threats from manifesting while simultaneously protecting fundamental rights. The principles behind the administrative state's tactics for reconciling conflicting missions offer ideas about how to implement structural checks to prevent the FBI's intelligence-collection mission from overwhelming these other important interests. 1. Juggling Mandates Conflict among agency missions comes about when one or more statutes issue mandates to a single agency that come into tension with one another or when government-wide mandates conflict with the primary goals of individual agencies subject to those mandates. n251 In one example, the National Park Service must protect the natural resources of the parks while simultaneously developing facilities for visitors. n252 Similarly, the Fish and Wildlife Service is required to manage wildlife refuges for the conservation of plants and animals while also providing for recreation on those refuges. n253 And the National Environmental Policy Act of 1969 (NEPA) n254 requires "all federal agencies" to minimize the environmental impacts of their actions. n255 For an agency focused on, for example, building roads [*67] through environmentally sensitive territory, the charge to protect the environment can be at odds with this focus. The FBI's mandate to protect civil liberties can be viewed as a "secondary" mission--one that frequently comes into tension with its primary mission of preventing security threats. n256 Studies show that an agency will focus on what it considers to be its primary mission, and it will shirk on performing "secondary" or less easily evaluated goals. n257 As a secondary mission, protection of civil liberties is, therefore, sure to be shortchanged in favor of security in the same way that environmental concerns have so often gone underaddressed in favor of development or other economically profitable activities. 2. Relieving the Tension Among Multiple Missions Fortunately, several administrative law strategies suggest ways to ensure that the Guidelines regime sufficiently takes into account civil liberties concerns as well as security concerns. n258 Though all of the options discussed below are possible paths to follow, the final two approaches discussed below seem particularly promising. Regulatory strategies can ensures the protection of civil liberties without undermining the FBI’s ability to prevent terrorism Berman, 14 --- Visiting Assistant Professor of Law, Brooklyn Law School (Winter 2014, Emily, Washington & Lee Law Review, “Regulating Domestic Intelligence Collection,” 71 Wash & Lee L. Rev. 3, Lexis, JMP) HIGHLIGHT: Abstract Scholars have long recognized that a Federal Bureau of Investigation wielding robust domestic intelligencecollection powers poses a threat to civil liberties. Yet the FBI's post-9/11 mandate to prevent terrorist attacks (not merely investigate completed attacks) demands that the agency engage in broad intelligence-collection activities within the United States--activities that can threaten fundamental freedoms. This Article argues that strategies derived from administrative law principles can help alleviate the tendency of threat-prevention efforts to erode civil liberties. The fundamental problem this Article tackles is that the traditional governance mechanisms we rely upon to protect individual rights are ineffective in the domestic intelligence-collection realm. This failure of traditional checks stems from, first, the absence of practical constraints to channel the enormous discretion that the Justice Department and the FBI enjoy in determining the scope and nature of the FBI's domestic 6intelligence-collection activities; second, the lack of judicial or political checks on these activities, resulting in a deficit of democratic legitimacy and accountability; and third, the risk that the FBI's singular focus on terrorism prevention will overwhelm rights-protection concerns. Drawing on principles of administrative law, this Article explains how regulatory strategies can be employed to improve governance of domestic intelligence gathering. It recommends imposing procedural requirements on the exercise of discretion, facilitating meaningful pluralist input into relevant decision making processes, and augmenting the attention given to civil liberties concerns by requiring the Justice Department to prepare Civil Liberties Impact Statements and by including in the process an entity whose primary goal is the protection of civil liberties. These governance reforms will prompt domestic intelligence regulation to take account of civil liberties while preserving the ability of law enforcement to pursue security. --- AT: Secrecy Link Applies to CP Notice and justification can be limited to those with a security clearance to maintain necessary secrecy Berman, 14 --- Visiting Assistant Professor of Law, Brooklyn Law School (Winter 2014, Emily, Washington & Lee Law Review, “Regulating Domestic Intelligence Collection,” 71 Wash & Lee L. Rev. 3, Lexis, JMP) Rules should similarly dictate that the Attorney General or FBI Director provide notice explaining the reasons for any proposed changes to the Guidelines or the DIOG and a justification for the ultimate decisions that demonstrates that all of the relevant available information was taken into consideration and that there was a valid basis for the change. The distinctions between traditional administrative law and national security administration require, however, some adjustments to the usual procedural design. While most agency notices of proposed rulemaking are part of the public record and freely available for wide dissemination, the classified nature of much of the FBI's activity and some of the rules contained in the DIOG requires that the dissemination of the notice and justification will often be limited to individuals with the necessary security clearance. n205 Imagine, for example, a proposed rule-change designed to modify surveillance operations to make them less likely to be detected by the target. Publicizing that intention and [*55] the resulting rule might undermine entirely the purpose of the revision. 1nc Politics NB Only the plan will face congressional opposition --- Congress wants to defer to the executive on the issue and avoid blame for intelligence failures Berman, 14 --- Visiting Assistant Professor of Law, Brooklyn Law School (Winter 2014, Emily, Washington & Lee Law Review, “Regulating Domestic Intelligence Collection,” 71 Wash & Lee L. Rev. 3, Lexis, JMP) First, some brief thoughts on political economy. This Article aims to propose some plausible reforms in an area where what Professor Heather Gerken calls the "here to there" problem is a significant obstacle. n158 Perhaps even more than in other policy areas, expectations that Congress will act to implement these recommendations--through legislation or through other available levers of power--are likely to be disappointed. Indeed, congressional oversight of national security policy has long been considered ineffective by government officials, outside task forces, and scholars. n159 The dearth of public information about national [*44] security policy, which makes oversight significantly more challenging, is partially to blame. n160 But there are also perverse incentives at work: legislators have no incentive to engage in aggressive oversight of intelligence-collection powers. n161 Legislators gain little by taking ownership over security policy. n162 Meanwhile, so long as Congress can label such policies "executive," it cannot be blamed for intelligence failures. n163 The result is that all electoral incentives point toward congressional deference to executive policy preferences in this area. n164 This is [*45] especially so for intelligence-collection policies imposing disproportionate impact on certain segments of society, such as minorities or noncitizens, whose interests carry little electoral weight with legislators. n165 Expectations that Congress will take action in this area are thus likely to be disappointed. 2nc Politics NB CP avoids political battles in congress and insulates policies from backlash Berman, 14 --- Visiting Assistant Professor of Law, Brooklyn Law School (Winter 2014, Emily, Washington & Lee Law Review, “Regulating Domestic Intelligence Collection,” 71 Wash & Lee L. Rev. 3, Lexis, JMP) Similarly, because granting decision-making authority to bureaucrats not subject to electoral forces that constrain other policymakers removes those decisions from the field of political battle, Congress both eludes responsibility for making difficult policymaking decisions and insulates the policies themselves from electoral backlash. n185 Broad agency discretion thus undermines the very nature of participatory democracy and raises concerns about political accountability for critical decisions of national policy. n186 [*51] And while the Supreme Court's decisions limiting legislative delegations to agencies were confined to the New Deal-era, n187 so long as Congress sets down an "intelligible principle" for the agency to follow, n188 many of the procedural rules developed in the administrative state serve to cabin discretion. n189 Thus, while agency decision makers continue to enjoy significant leeway, the threat to democracy and accountability posed by agency discretion has not gone unaddressed. CP alone doesn’t link to politics --- Congress wants to delegate the policy-making to others Berman, 14 --- Visiting Assistant Professor of Law, Brooklyn Law School (Winter 2014, Emily, Washington & Lee Law Review, “Regulating Domestic Intelligence Collection,” 71 Wash & Lee L. Rev. 3, Lexis, JMP) The accountability gap left by the absence of judicial review will not be filled by legislative or public scrutiny. The origin story of the original Attorney General Guidelines included a significant role for Congress. n121 Having been prompted by the Church [*35] Committee's findings of misconduct and the resulting public outrage, the legislature was intimately involved in developing the contents of the Guidelines. n122 Congress held a series of hearings on the issue over the course of several years, and saw its suggestions ultimately reflected in the Levi Guidelines. n123 Given that the Guidelines were implemented, at least in part, to avoid more stringent legislative action, n124 this is not a surprise. Surely Attorney General Levi knew that if the rules he instituted did not appear to address Congress's concerns, they would fail to sap the momentum for enacting a statutory charter for the FBI. The contemporary political economy of congressional oversight in this area means that legislative oversight will not provide any more effective a check than judicial action. Legislators' incentives weigh against aggressive involvement. The downside risks of unsuccessful counterterrorism policies (additional attacks) are high. n125 If those policies are developed outside of the legislative process, Congress can share (if not entirely evade) blame. Moreover, counterterrorism policy "is a subject matter that is especially prone to legislative delegation because it often entails hard trade-offs," which are the types of questions Congress is least likely to address. n126 In addition to undermining legislative involvement in counterterrorism policy formulation, existing institutional features also render [*36] congressional oversight of domestic intelligence-collection policy ineffectual. Congress, of course, retains oversight authority over the FBI. n127 If it wants to play a more active role in overseeing the Guidelines, it has the tools to do so. n128 After all, Congress determines whether and to what degree the FBI's intelligence-collection activities are funded. n129 Moreover, the relevant committees of jurisdiction conduct regular oversight hearings at which the Attorney General and FBI Director appear. n130 Legislators can ask Justice Department and FBI officials for information about the Guidelines or the FBI's activities at any time. n131 Perhaps as a result of the existing incentive structure, however, Congress has shown little appetite to pursue Guidelines-related issues of late. n132 The most recent modification to the Guidelines, for example, failed to reflect congressional input. The Justice Department provided the Senate Judiciary [*37] Committee a completed draft of the Mukasey Guidelines a few months before they were implemented. n133 A handful of senators requested that Attorney General Mukasey delay their implementation until Congress had the opportunity to develop suggestions regarding ways to minimize civil liberties concerns. n134 Their request went unanswered. And even when FBI Director Robert Mueller III inaccurately testified in 2010 before Congress that the FBI did not have the authority to conduct unpredicated investigations, legislators took no follow-up action. n135 While Congress has shown little interest in scrutinizing the Guidelines, the public is not given a choice in the matter. Activity undertaken pursuant to the Guidelines is secret and therefore rarely apparent on its own or reported in sufficient detail in the news media. n136 Moreover, information about how the Guidelines are used is exempt from disclosure under the Freedom of Information Act on the basis of either the law enforcement or the classified-information exemption contained in that statute. n137 The public also lacks means to scrutinize how the rules are [*38] implemented. In some cases even the rules themselves are secret. The publicly available version of the DIOG, for example, entirely redacts the rules governing undisclosed participation in religious or political gatherings. n138 Attorney General Guidelines are empirically designed to prevent legislative action Berman, 14 --- Visiting Assistant Professor of Law, Brooklyn Law School (Winter 2014, Emily, Washington & Lee Law Review, “Regulating Domestic Intelligence Collection,” 71 Wash & Lee L. Rev. 3, Lexis, JMP) Over time, both the Bureau's focus and the rules governing its activities have swung back and forth along the spectrum between the targeted investigations of crime solving and the broader intelligence gathering associated with prevention. The Guidelines themselves are the product of the FBI's early-1970s move away from intelligence collection. After the United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities, commonly known as the Church Committee for its chair Senator Frank Church (D-ID), [*13] revealed that decades of unregulated intelligence collection by the FBI had resulted in widespread abuses of the government's investigative powers, n29 Congress determined that the FBI should be subject to a legislative charter setting out strict limits on its intelligence-collection authority. n30 In an effort to stave off potentially more restrictive legislative action, President Gerald Ford's Attorney General, Edward Levi, issued in 1976 the first set of Attorney General's Guidelines--known as the Levi Guidelines. n31 Guidelines are shrouded from public criticism Berman, 14 --- Visiting Assistant Professor of Law, Brooklyn Law School (Winter 2014, Emily, Washington & Lee Law Review, “Regulating Domestic Intelligence Collection,” 71 Wash & Lee L. Rev. 3, Lexis, JMP) While Congress has shown little interest in scrutinizing the Guidelines, the public is not given a choice in the matter. Activity undertaken pursuant to the Guidelines is secret and therefore rarely apparent on its own or reported in sufficient detail in the news media. n136 Moreover, information about how the Guidelines are used is exempt from disclosure under the Freedom of Information Act on the basis of either the law enforcement or the classified-information exemption contained in that statute. n137 The public also lacks means to scrutinize how the rules are [*38] implemented. In some cases even the rules themselves are secret. The publicly available version of the DIOG, for example, entirely redacts the rules governing undisclosed participation in religious or political gatherings. n138 2nc Solvency *** ***note when prepping file --- the ev in “AT: No Enforcement” is also very useful to defend the general solvency of the counterplan. The ev in both blocks are useful in many different ways. Indicts of the administrative law process assume the current Guidelines and do not reflect the counterplan’s changes to the process --- it creates a more transparent, accountable, and legitimate means to balance security objectives with the protection of civil liberties. CP ensures accountability and constrains agency abuses Reason-giving requirements will help constrain agency abuses and ensure accountability --- CP would have prevented most dangerous changes in 2008 Guidelines Berman, 14 --- Visiting Assistant Professor of Law, Brooklyn Law School (Winter 2014, Emily, Washington & Lee Law Review, “Regulating Domestic Intelligence Collection,” 71 Wash & Lee L. Rev. 3, Lexis, JMP) B. Reason-Giving as Constraint Courts and commentators have raised a litany of reasons why extending broad discretion to administrative agencies can be problematic from a governance standpoint--reasons that apply with equal force to the FBI's exercise of intelligence-collection powers. Agency strategy for channeling discretion, largely dominated by reason-giving requirements, is therefore an important source of ideas for addressing that concern in the context of the Guidelines regime. 1. The Downsides of Discretion Consigning significant policy choices to administrative agencies operating with broad discretion undermines the constitutional mechanism of promoting both accountability and sound decision making. When it comes to legislation, the Constitution seeks to avoid these concerns by subjecting legislative decisions to the deliberation and contestation that serves as a bulwark against faction and tyranny. n182 Freed from [*50] the requirements of Article 1, § 7, n183 however, agency decision makers might engage in a wise and thoughtful decision-making process; but they are equally capable of making poor choices, opting for policies that are uninformed, arbitrary, irrational, self-interested, or otherwise untethered to the public interest. n184 Absent some alternative check on the way in which discretion is exercised, there is therefore no reason to expect an agency's decision-making process to result in the best outcome--however that is defined. Similarly, because granting decision-making authority to bureaucrats not subject to electoral forces that constrain other policymakers removes those decisions from the field of political battle, Congress both eludes responsibility for making difficult policymaking decisions and insulates the policies themselves from electoral backlash. n185 Broad agency discretion thus undermines the very nature of participatory democracy and raises concerns about political accountability for critical decisions of national policy. n186 [*51] And while the Supreme Court's decisions limiting legislative delegations to agencies were confined to the New Deal-era, n187 so long as Congress sets down an "intelligible principle" for the agency to follow, n188 many of the procedural rules developed in the administrative state serve to cabin discretion. n189 Thus, while agency decision makers continue to enjoy significant leeway, the threat to democracy and accountability posed by agency discretion has not gone unaddressed. 2. Channeling Discretion into Reasoned Decision-Making The administrative state has grappled with legitimizing broad delegations throughout its history. n190 Over the years, reasoned decision making emerged as an important means of [*52] limiting discretion and improving the quality of agency policymaking by requiring agencies to justify their actions. n191 And while these reason-giving requirements exist in part to facilitate judicial review of agency action, they also have the intrinsic value of promoting agency experts' exercise of their discretion in a thoughtful, principled fashion. n192 These requirements come from two sources: the Administrative Procedure Act n193 supplemented by the requirement from SEC v. Chenery Corp. (Chenery II) n194 that agency actions are valid only if they can be upheld according to the rationale given by the agency at the time the decision was made. n195 [*53] The APA procedures for informal rulemaking employ two strategies for ensuring that agencies can engage in a process of reasoned decision making. n196 First, the APA has a notice requirement, which is designed to broaden the range of information and perspectives the agency must take into account n197 in order to promote more informed decision making. n198 To ensure these goals are met, the APA demands that an agency's notice must "fairly apprise interested persons of the subjects and issues" at stake whenever they intend to engage in a rulemaking n199 and indicate the rulemaking's legal and factual basis as well as its policy purpose. n200 Thus, the APA aims to ensure that agencies have before them all relevant information when making policy decisions The second element of the APA's strategy for channeling discretion is the obligation that agencies issue a public statement when announcing a final rule. n201 Just as written judicial opinions demonstrate that a court's decision is supported by facts, law, and [*54] precedent, these statements of purpose serve to demonstrate that agency officials considered all of the information before them and engaged in a "process of reasoned decision-making." n202 To that end, the statement must include the rule's basis and purpose as well as a justification of the decisions that led to its adoption, and it must "indicate the major issues of policy that were raised in the proceedings and explain why the agency decided to respond to these issues as it did." n203 Moreover, under Chenery II, only if the purpose provided by the agency constitutes a valid justification for the decision will it be legitimate. n204 Rules should similarly dictate that the Attorney General or FBI Director provide notice explaining the reasons for any proposed changes to the Guidelines or the DIOG and a justification for the ultimate decisions that demonstrates that all of the relevant available information was taken into consideration and that there was a valid basis for the change. The distinctions between traditional administrative law and national security administration require, however, some adjustments to the usual procedural design. While most agency notices of proposed rulemaking are part of the public record and freely available for wide dissemination, the classified nature of much of the FBI's activity and some of the rules contained in the DIOG requires that the dissemination of the notice and justification will often be limited to individuals with the necessary security clearance. n205 Imagine, for example, a proposed rule-change designed to modify surveillance operations to make them less likely to be detected by the target. Publicizing that intention and [*55] the resulting rule might undermine entirely the purpose of the revision. While the effect of limited dissemination of notice and justification will not be as robust as a process that is entirely transparent, limits on dissemination need not render written notice and justification worthless. In addressing concerns over excessive discretion, the crucial elements of the relevant administrative strategy are (1) that the notice broaden the range of information and perspectives that the agency considers and (2) that the written justification demonstrates that the agency's decision enjoys sufficient factual and legal support. To accomplish this, the notice and justification must go to individuals or entities whose participation would serve to expand the information and perspectives available to the decision makers and whose scrutiny of the ultimate justification would encourage the adoption of rules supported by reasoned argument and available evidence. Candidates to receive this notice and justification are both inside and outside the Justice Department. The Justice Department's Civil Rights Division and Office of Privacy and Civil Liberties as well as the National Security Division could be invited to comment. Similarly, other members of the intelligence community, such as the Office of the Director of National Intelligence should be involved. But the Privacy and Civil Liberties Oversight Board (PCLOB) should contribute its perspective as well. This is not meant to be an exhaustive list of possibilities. Nor will each of these institutions necessarily take on the role of civil-liberties champion or do so effectively. n206 For now, it is enough to say that so long as they have access to the relevant information and bring a perspective different from the one within the Attorney General's office or the FBI, their participation would help to channel discretion in a productive direction. The 2008 modifications to the Guidelines provide a concrete example of how the requirement that the Attorney General provide reasons justifying amendments could impact the process. [*56] One proffered justification for amending the Guidelines in 2008 was that they were necessary to provide tools the FBI needed to support its preventive role. n207 But the then-existing Guidelines already described prevention as the FBI's "central mission," and included several provisions added in 2002 that were aimed at empowering and enabling this aspect of the FBI's activities. n208 In asserting that the 2008 Guidelines were necessary for terrorism prevention, the Bureau had no obligation to explain how its activities were unacceptably constrained by the rules that were then in effect, which were drafted for the same purpose. n209 Under these proposed rules, the Attorney General would have had to make that case, allowing those entities that were notified the opportunity to question the need for changes and possibly even make those concerns public. n210 And if the Attorney General could not do so satisfactorily, it would have made altering the Guidelines a much more controversial proposition. Requiring written justification of the final rules also might have had an impact on the 2008 revisions. On the one hand, the Justice Department downplayed the extent to which the Guidelines expanded the FBI's powers. The new Guidelines were characterized as merely consolidating several existing sets of rules without making substantive changes. n211 In fact, Justice Department officials asserted that assessments were nothing [*57] new, and that under the pre-2008 Guidelines it could already conduct assessments using pretext interviews, physical surveillance, and the tasking of informants. n212 But there was no "assessment" level in the pre-2008 Guidelines. n213 Indeed, they explicitly prohibited both pretext interviews and physical surveillance until a preliminary inquiry--a predicated investigation--had been opened. n214 "Threat assessments" were permitted in some contexts under the 2003 National Security Investigation Guidelines, but by the FBI's own admission, some of the techniques available in today's assessments were prohibited in that context. n215 Had the Attorney General or FBI Director been required to explain exactly what changes were being made and provide the rationale for the new rules, the creation of assessments in their current form--the central innovation of the 2008 Guidelines--might have met with more resistance. In particular, the ways in which assessments expanded the FBI's powers, for example permitting use of several investigative techniques historically reserved for predicated investigations, would have become clear and consequently would have been subject to closer examination. As it was, the Attorney General could simply disclaim the idea that new powers were being granted without having to substantiate that statement. [*58] In addition to any substantive differences to the 2008 Guidelines that would have resulted, a notice and justification requirement would have provided other concrete benefits. First, it would have guaranteed that decision makers had the benefit of additional perspectives while they were still developing the policy. It is much easier--and therefore more likely--for policymakers to incorporate alternative perspectives into policy still being developed than once that policy is nearing its final form. n216 Second, obligating the Attorney General to address the information that was submitted to him and to explain in writing why the Guidelines should be implemented in his chosen format would force him to digest that information and therefore might actually result in a more informed decision. n217 Third, it would have added additional legitimacy to the final product if n218 the 2008 Guidelines development had been based on specific, reasoned arguments regarding the need for modifications. CP’s participatory process makes the guidelines more democratic and boosts support and cooperation from communities Berman, 14 --- Visiting Assistant Professor of Law, Brooklyn Law School (Winter 2014, Emily, Washington & Lee Law Review, “Regulating Domestic Intelligence Collection,” 71 Wash & Lee L. Rev. 3, Lexis, JMP) C. Participatory Policymaking Nowhere does the Constitution provide for the existence of administrative agencies, much less for specific means of ensuring that their actions do not infringe on fundamental rights or that they are subject to democratic accountability. n219 The administrative state has grappled with this "democracy deficit" almost since its inception. n220 One means employed to address it has been through increasing opportunities for broad participation in agency decision making. Designing ways to employ these [*59] strategies for increased participation could lend increased democratic legitimacy to the intelligence-collection realm. 1. Administrative Agencies' Democracy Deficit Administrative agencies initially were viewed either as entities merely implementing congressional will or as bastions of expertise, making decisions on the basis of scientific or technical knowledge. n221 By the latter half of the twentieth century, however, it had become clear that many congressional delegations are vague and that many agency decisions cannot be resolved definitively through substantive expertise. n222 Instead, such decisions often rest on subjective judgments about policy priorities, the value of human well-being, and who should bear the costs of inevitable risks. The Guidelines are thus not alone in their undemocratic nature. This democracy deficit "has spawned an extensive literature concerning the legitimacy of the administrative state." n223 Indeed, Professor Jody Freeman has suggested that "[a]dministrative law scholarship has organized itself largely around the need to defend the administrative state against accusations of illegitimacy" n224 based on the unaccountability of agency officials, a lack of transparency, and limited opportunities for public participation. n225 [*60] 2. Increasing Democracy, Increasing Participation One answer to the democracy deficit implemented by the administrative state has been to boost the democratic pedigree of agency rules by insisting on broad participation. n226 A variety of procedural and doctrinal rules in the administrative state promote the broad participation of interested stakeholders. As with limits on discretion, the informal rulemaking process set out in the APA promotes participation through the implementation of strategies that can help improve the democratic pedigree of the Guidelines and the DIOG. The first element of the strategy for improved democratic legitimacy is that the notice of proposed rulemaking itself must be provided in such a way as to facilitate meaningful participation, n227 such as including the legal and factual basis for the proposed rule n228 and the data on which the agency relied in making its proposal. n229 These mandates ensure that stakeholders who want to participate have enough information to permit them to raise objections, provide additional information, or offer alternative perspectives. The notice, therefore, not only alerts diverse interested parties that there is a decision being contemplated for which they might want to provide input, but also ensures that input can be meaningful. Second, the agency must actually consider this input. A final rule's statement of basis and purpose must "indicate the major issues of policy that [*61] were raised in the proceedings and explain why the agency decided to respond to these issues as it did." n230 Thus any failure to take into account relevant comments can invalidate the rule. This risk of invalidation discourages the development of rules that do not take all relevant perspectives into consideration. n231 Again, these requirements will also result in rules that enjoy more democratic legitimacy than a rule prepared without such input. Affected parties are more likely to view agency decisions as legitimate if the process provides for a meaningful opportunity for presentation and consideration of their views. And if the rules are considered legitimate, the FBI will be much more likely to enjoy the full support and cooperation of the communities it is policing, leading to more effective intelligence collection. Devising rulemaking mechanisms that are inclusive and allow for meaningful input from interested stakeholders presents a challenge when it comes to the domestic-intelligence regime because secrecy presents a formidable barrier to inclusion. n232 Even with respect to rules that are themselves public, such as the Guidelines, robust public participation in the process is impractical because there is insufficient public information about how those rules are implemented. The public may know, for example, that FBI agents are permitted to attend any religious service that is open to the public. n233 But it will not know how [*62] often agents engage in this activity, what information they collect, or what is done with the information. Rules that are themselves secret, such as portions of the DIOG, present an even more formidable challenge. To be sure, a strong case can be made that the existing levels of secrecy--with respect to both the rules and the policy implementation--are excessive. n234 Unless and until that secrecy is reduced, however, intelligencecollection policies will struggle to gain the benefits that inhere in broadly inclusive agency rulemaking. Yet, the Justice Department clearly hopes to realize at least some of the benefits of democratic input when it comes to the Guidelines. Recall the Department's 2008 briefing of relevant congressional committees and other interested parties prior to the Guidelines' adoption. n235 The Bureau did the same thing in 2001 when it revised the DIOG. n236 These meetings allowed the FBI to characterize these documents as rules developed with input from an array of stakeholders and thus deserving of the enhanced legitimacy that broad participation confers. n237 So even if the consultations themselves failed to result in meaningful participation beyond the Justice Department, n238 they indicate recognition that agency decision makers desire (at least the appearance of) an inclusive process. The benefits of participatory decision making require a more robust process than the one undertaken in 2008. Recognizing that [*63] the public at large will not be able to play a meaningful role, a second-best measure is to seek out proxies for points of view currently not formally represented in the process of developing the Guidelines and the DIOG. An example comes from Professors DeShazo and Freeman's empirical case study of the licensing practices of the Federal Energy Regulatory Commission. n239 In the amended Electric Consumers Protection Act of 1986, n240 "Congress [required the Commission] to consult with fish and wildlife agencies prior to issuing licenses [and demanded] that nondevelopmental values be given 'equal consideration' with power concerns." n241 DeShazo and Freeman explain that this amendment was specifically intended to strengthen the role of resource agencies in the Federal Energy Regulatory Commission's decision-making process n242 and that it did in fact have the desired effect. n243 [*64] A procedural regime governing the Guidelines' development could similarly mandate the participation of particular entities that will bring alternative perspectives to the discussion. Each of the entities noted as a potential recipient of notice and source of information could play this role. One especially promising candidate for this role is the Privacy and Civil Liberties Oversight Board (PCLOB), a statutorily created independent agency charged with ensuring that privacy and civil liberties concerns are considered in the development and implementation of laws, regulations, and policies related to terrorism. n244 The PCLOB took several years to get off the ground. n245 In the wake of recent revelations regarding NSA surveillance, however, it has demonstrated its ability to participate in the surveillance-policy conversation by insisting on a classified briefing about the controversial surveillance programs, meeting with the President, n246 holding a public hearing seeking concrete suggestions for improving the civil liberties protections included as part of those programs. n247 Based in part on what members of the Board learned at that meeting, the PCLOB issued a detailed report recommending specific changes to one existing surveillance program and anticipates issuing similar reports about other programs. n248 Whether any of the PCLOB's recommendations will [*65] be adopted remains to be seen. But giving the Board an official role in the process in which the Guidelines and the DIOG are formulated would ensure that the civil liberties point of view is represented. This participation could take one of several forms, ranging from an opportunity to express views to veto power. n249 If the requirement is modeled on the concept behind the participation requirements included in notice-and-comment rulemaking, then it will end up somewhere between these two extremes, with something like the following arrangement: The PCLOB would have the opportunity to submit its perspective; having received this input, the Attorney General or the FBI Director would be required to demonstrate that it was taken into consideration. Finding ways to broaden the perspectives involved when it comes to the DIOG is particularly important. Currently, nobody outside the FBI must be involved. Ensuring that alternative perspectives are voiced and requiring that the final rules reflect, or explain why they fail to reflect, these perspectives may provide some of the benefits of the multilateral, deliberative process that truly pluralist rulemaking procedures promote. n250 Administrative state mechanisms can check the AG and FBI --- external checks fail The administrate state has developed mechanisms that can be borrowed to ensure the Attorney General and FBI protect civil liberties and maintain anti-terror effectiveness --- other external checks will fail Berman, 14 --- Visiting Assistant Professor of Law, Brooklyn Law School (Winter 2014, Emily, Washington & Lee Law Review, “Regulating Domestic Intelligence Collection,” 71 Wash & Lee L. Rev. 3, Lexis, JMP) [*5] I. Introduction In the summer of 2013, former National Security Agency contractor and Central Intelligence Agency employee Edward Snowden shook the world with revelations of extensive United States government surveillance activities--including surveillance of American citizens. n1 The revelations sparked a renewed debate about the proper scope of intelligence collection in a democracy. What has gone unaddressed in this debate, however, is the vast investigative powers conferred on America's domestic surveillance agency--the Federal Bureau of Investigation (FBI). And unlike the foreign-intelligence programs disclosed by Snowden's leaks, some of the FBI's most powerful domestic intelligence-collection authorities include neither statutory limits nor judicial oversight. n2 If the FBI determines that an individual's daily life is relevant to a terrorism investigation, it can easily draw a detailed picture of that life. n3 With no reason at all for suspicion and no judicial approval, agents can follow the individual around the clock to ascertain where he goes. They can ask his neighbors about their conversations with him, or dispatch an informant to his house of worship to report on the individual's religious [*6] observance. With the minimal process associated with issuing an administrative subpoena, n4 the government can establish a record of the individual's movements and social dealings by acquiring financial and employment records, a list of email addresses with which he has corresponded, and a list of phone numbers he has dialed. These broad investigative powers operate in tension with fundamental rights. Collecting extensive personal information about innocent Americans raises concerns about privacy; about impact on freedoms of expression, association, and religious practice; and to the extent that such activity is disproportionately focused on particular communities, it can raise equal protection concerns as well. n5 The challenge, then, is how to mitigate these civil liberties threats without unduly interfering with the FBI's ability to prevent terrorist attacks. This Article argues that administrative law strategies suggest several measures that, taken together, would represent a domestic intelligence governance regime better equipped to safeguard civil liberties. This argument bridges a gap between two growing areas of literature. The first, which I label "riskmanagement literature," advocates taking a regulatory approach to the threat of terrorism--to treating it not as an enemy to defeat, but, like environmental or health and safety risks, as a chronic problem to be assessed and managed. n6 The other, the [*7] "rights-protection literature," argues that the current domestic intelligence-collection governance regime fails to address effectively the tension with civil liberties created by the FBI's contemporary counterterrorism efforts. n7 I contend that the risk-management literature's valuable insight that administrative law can usefully be applied to improve governance in the security context suggests a means of mitigating the rights-protection scholars' concerns These rights-protection concerns arise in large part because traditional means of regulating executive power cannot effectively protect civil liberties in this area. This failure of traditional checks results from three characteristics of the regime regulating domestic intelligence collection. First, it lacks both doctrinal and practical constraints on the FBI and Justice Department's enormous discretion in drafting and implementing the applicable rules. n8 Second, the checks that normally ensure the accountability and democratic legitimacy of government actions--judicial review, congressional oversight, and public scrutiny--simply do not operate effectively in the secretive world of intelligence collection. n9 And third, in its vigorous pursuit of [*8] terrorism prevention, the FBI is not subject to any structural checks to prevent it from undervaluing rights protection. n10 This broad discretion, democracy deficit, and absence of counterweight to the FBI's prevention goal means that--despite the privacy and liberty implications of the FBI's activities--the responsibility of striking a balance between security needs and other important interests is left almost entirely to the Attorney General and the FBI itself. Restraints on the FBI's domestic intelligence-collection activities come from the Attorney General's Guidelines for Domestic FBI Operations (Guidelines) n11 and the Domestic Investigations and Operations Guide (DIOG). n12 The Guidelines are developed by the Attorney General and set out a basic framework for the FBI's operations; the several-hundred-page DIOG, promulgated by the FBI, specifies more detailed rules for the Guidelines' implementation. n13 The Guidelines were originally created to forestall impending legislative efforts to cabin the Bureau's intelligence-collection powers n14 but due to subsequent changes--particularly post-9/11 changes aimed at promoting terrorism-prevention efforts-the Guidelines and DIOG now serve to facilitate rather than limit the Bureau's intelligence-collection role. [*9] Conceptualizing the threat of terrorism as a regulatory challenge represents a significant first step toward devising an improved governance regime for the Guidelines and the DIOG. But there are additional steps that the existing risk-management literature has not yet taken. The idea of how administrative law would apply to intelligence collection remains undertheorized--an unsurprising state of affairs given the recent emergence of this line of inquiry. Scholars have not yet tackled the thorny question of how to truly reap the benefits that the regulatory approach offers, while simultaneously taking into account the unique governance challenges presented by the domestic-intelligence context. Nor has the literature to date sufficiently grappled with civil liberties concerns. n1 This Article seeks to fill these gaps, drawing on administrative law principles to suggest novel governance designs custom tailored to address the civil liberties concerns inherent in domestic intelligence collection. To do so it looks to areas of administrative law that present similar governance challenges, identifies how those challenges have been addressed in the administrative state, and suggests how to adapt those strategies to function in the intelligence-collection context. n16 Each of the governance challenges this Article identifies has an analog in the administrative state. Take first the scope of discretion conferred on federal officials. This delegation of discretionary authority to the Attorney General and the FBI resembles the broad delegations in statutes establishing administrative agencies' powers and responsibilities. Concerns arising from the scope of these delegations are addressed through [*10] the Administrative Procedure Act's (APA) n17 procedural requirements. n18 Second, the absence of judicial, legislative, or public involvement in the design and implementation of the Guidelines is reminiscent of the democracy deficit inherent in the promulgation of regulations by technical experts so often at the heart of debates over the legitimacy of the administrative state. The administrative state has responded to this deficit by developing mechanisms to increase the participatory nature of administrative activity. n19 And third, the risk that the Guidelines privilege the FBI's primary mission--the prevention of terrorism and protection of national security--over concerns for fundamental rights mirrors the many circumstances where agencies are charged simultaneously with multiple, competing goals. A menu of regulatory tools has been developed to reconcile competing agency missions. n20 Looking to the lessons that can be gleaned from these administrative governance strategies provides a useful roadmap for filling the intelligence-collection governance gap in a way that also protects civil liberties. The Article proceeds in three parts. Part II first argues that the expansive scope of investigative authority that the current Attorney General's Guidelines and the FBI's implementing procedures confer on the Bureau exist in tension with the protection of civil liberties. It then contends that the lack of practical, traditional judicial or political, and structural checks to impose effective oversight on domestic intelligence gathering necessitates the implementation of alternative governance mechanisms. In Part III, the Article harnesses administrative law strategies to suggest regulatory tools custom tailored to yield [*11] regulatory benefits that protect fundamental rights in the context of the FBI's Guidelines regime. To do so, it first explores the underlying purposes and justifications of traditional administrative law tools that are used to address governance challenges conceptually similar to those that the Guidelines regime presents. n21 It then suggests specific reforms designed to achieve the same ends as those traditional tools in the intelligence-collection context. n22 First, the Attorney General's discretion in the development and implementation of the Guidelines should be subject to a reason-giving requirement. Specific procedural limitations should require that the Attorney General or FBI Director provide both notice of a decision to amend the Guidelines or the DIOG and written justifications for their ultimate decisions. Second, to enable meaningful pluralist input into the process, the FBI must go beyond the cursory meetings with interested stakeholders that it has relied upon to date. Instead, a variety of entities inside the government should be empowered to participate in the amendment process. Third, to balance the government's interest in security with privacy and liberty concerns, (1) any changes to the Guidelines regime should be accompanied by a "Civil Liberties Impact Statement" prepared by the Justice Department, and (2) stakeholders whose primary goal is the protection of liberties--rather than the pursuit of security--should be involved in the process of drafting or modifying the Guidelines and their implementing regulations. n23 This approach will impose a meaningful governance regime crafted for domestic intelligence gathering that mitigates concerns about the impact on civil liberties without sacrificing security. Part IV addresses some possible sources of skepticism for this proposal. It first explains why reliance on existing administrative law tools--even if those tools are partially modified to operate in the intelligencecollection realm--will be [*12] insufficient to protect civil liberties. n24 It then responds to questions about how to enforce these reforms in the absence of judicial review, suggesting alternative compliance mechanisms. n25 CP ensures that civil liberties are considered and protected Berman, 14 --- Visiting Assistant Professor of Law, Brooklyn Law School (Winter 2014, Emily, Washington & Lee Law Review, “Regulating Domestic Intelligence Collection,” 71 Wash & Lee L. Rev. 3, Lexis, JMP) V. Conclusion Domestic intelligence collection presents a challenge in a democracy. While it can play a crucial role in keeping our nation secure, it also poses threats to the very freedoms that make that nation worth defending. When the prevention of terrorism is viewed as a regulatory problem--one to be managed rather than defeated--the challenge becomes more manageable. Examining regulatory strategies developed over the past half-century in the administrative state provides a roadmap for the development of structural and procedural mechanisms to channel executive discretion into reasoned, evidence-based decisions; to include viewpoints from outside the intelligence community in the process; and to ensure that the Justice Department explicitly takes into account the civil liberties perspective. n350 The need to substitute alternative mechanisms for tools that are often effective in governing agency action, such as judicial review and public scrutiny, means that they may be less directly effective in achieving their goals. n351 But developing such a framework is a [*91] viable second-best option in a context where the traditional means of government oversight break down. n352 It will contribute to generating the appropriate FBI for the twenty-first century, one that takes into account not only the nature of the disease, but also the potential costs of the cure. Solves Terrorism / Community Trust / Legitimacy ***note when prepping file --- there is also ev in “2nc Solvency” that defends why the CP boosts ties with communities. CP allows the FBI to boost its legitimacy and rebuild trust with communities Berman, 14 --- Visiting Assistant Professor of Law, Brooklyn Law School (Winter 2014, Emily, Washington & Lee Law Review, “Regulating Domestic Intelligence Collection,” 71 Wash & Lee L. Rev. 3, Lexis, JMP) [*46] Given the appropriate political environment, there are at least three reasons to think that the imposition of a framework like the one suggested here is not entirely implausible. As an initial matter, there is the FBI's concern over legitimacy. The Bureau's ability to succeed in its mission requires constructive relationships with the communities in which it operates. n168 Yet its aggressive intelligence-collection tactics-and their concentration in Muslim communities--has alienated many members of that community, raised suspicion and distrust of the Bureau in some quarters, and undermined cooperative relationships. n169 Improved governance is thus not the only benefit that would flow from implementing APA-like procedures; institutionalizing rulemaking procedures would also yield improvements in community relations, public perceptions of legitimacy, and consequently, FBI effectiveness. In addition, government documents and scholarly commentary are replete with arguments about the value of process in legitimating government action. n170 The FBI's practice of reaching out to nongovernmental organizations in anticipation of issuing new intelligence-collection rules indicates an awareness of the benefits of generating the support of outside stakeholders. n171 Subjecting itself to a set of procedural rules would go far in this regard. And finally, none of the proposals here are substantive. They do not call upon the FBI to cede any particular powers, or to discontinue existing policy. Indeed, they acknowledge the Attorney General's and FBI's role in generating the rules by which the FBI operates, so long as they can show [*47] both that changes in the FBI's authority are needed and that the proposed changes are reasonable ones. And finally, when it comes to imposing limits on government actors, broad procedural frameworks often face less opposition than substantive policy changes. n172 The problem with the current FBI Guidelines is that they shrouded from public input and criticism Berman, 14 --- Visiting Assistant Professor of Law, Brooklyn Law School (Winter 2014, Emily, Washington & Lee Law Review, “Regulating Domestic Intelligence Collection,” 71 Wash & Lee L. Rev. 3, Lexis, JMP) While Congress has shown little interest in scrutinizing the Guidelines, the public is not given a choice in the matter. Activity undertaken pursuant to the Guidelines is secret and therefore rarely apparent on its own or reported in sufficient detail in the news media. n136 Moreover, information about how the Guidelines are used is exempt from disclosure under the Freedom of Information Act on the basis of either the law enforcement or the classified-information exemption contained in that statute. n137 The public also lacks means to scrutinize how the rules are [*38] implemented. In some cases even the rules themselves are secret. The publicly available version of the DIOG, for example, entirely redacts the rules governing undisclosed participation in religious or political gatherings. n138 AT: Solvency Deficit --- Top Level Aff can’t solve any better --- external checks embodied in the plan aren’t applicable in this context Berman, 14 --- Visiting Assistant Professor of Law, Brooklyn Law School (Winter 2014, Emily, Washington & Lee Law Review, “Regulating Domestic Intelligence Collection,” 71 Wash & Lee L. Rev. 3, Lexis, JMP) B. Existing Failures of Intelligence-Collection Governance If the FBI's intelligence-collection authorities do not run afoul of existing legal limits, why is the way in which they are governed a cause for concern? Because despite these authorities' [*29] undisputed implications for civil liberties n94--indeed, their tendency to result in civil liberties infringements is what inspired the implementation of the Guidelines in the first instance--they are untouched by the nondoctrinal constraints that usually accompany law enforcement activities. This means that the only constraints on the FBI's intelligence-collection powers are the internal rules the Justice Department and the FBI have imposed on themselves. Several inherent differences between intelligence collection and crime-solving investigations account for the inapplicability of constraints that usually limit government action. First, the very nature of the intelligence-collection enterprise is inherently more expansive in scope--proactive rather than reactive and less narrowly targeted. n95 Consequently, practical constraints that usually serve to limit law enforcement agencies' activities--resource limitations and a focus on solving individual crimes--are inapplicable. Second, the secretive nature of intelligence-collection activities renders them effectively immune to judicial review as well as scrutiny from the legislature and the public. n96 And third, the Justice Department and the FBI generate the Guidelines and the DIOG in the context of the FBI's post-9/11 focus on terrorism prevention. n97 This means that the rules are crafted by government officials with security and intelligence-collection expertise. There are, therefore, no structural checks to remove from the hands of security technocrats the normative judgments that must be made about the relative importance of [*30] aggressive intelligence collection and rights protections. n98 The result is that, despite the fact that intelligence collection implicates important values, the only constraints on that collection are effectively self-imposed. AT: Solvency Deficit --- Court Specific CP solves better --- judicial restrictions will fail for 3 reasons Secrecy, no standing, state secrets privilege Berman, 14 --- Visiting Assistant Professor of Law, Brooklyn Law School (Winter 2014, Emily, Washington & Lee Law Review, “Regulating Domestic Intelligence Collection,” 71 Wash & Lee L. Rev. 3, Lexis, JMP) 2. Intelligence Collection and Judicial or Political Constraints In engaging in the broad intelligence-collection activities envisioned by the Guidelines, the FBI will elude traditional checks on power, such as judicial review and congressional or public oversight. The result is that the Guidelines and their implementation lack both the accountability and the democratic legitimacy that usually accompanies government policy. n108 There are several obstacles to judicial review of the Guidelines and the activities undertaken pursuant to them. As an initial matter, the Guidelines themselves disclaim any intention to create enforceable rights, so any action taken pursuant to them can be challenged only if it is otherwise unlawful. n109 In addition, the secrecy of these activities ensures that individuals who seek to challenge intelligence-collection regimes will struggle to demonstrate a sufficiently concrete injury to establish standing to sue. n110 Surveillance tactics are designed to prevent targets from being alerted to the fact that law enforcement is gathering information about them, so it is difficult to point to specific government action causing harm. n111 Moreover, courts have held [*33] that neither allegations of general chill nor an "objectively reasonable likelihood" that a plaintiffs' communications will be subject to surveillance are sufficient. n112 Thus, standing remains a bar to the courthouse door. Another barrier that has proved fatal to judicial review of intelligence collection is the state secrets privilege, n113 which allows the government to withhold evidence whose disclosure might endanger national security. n114 At times the privilege results in a case being dismissed outright. n115 In other instances, a [*34] suit may proceed with evidence that the government is willing to share only ex parte, n116 undermining the proceedings' adversarial nature. The government's investigative actions are most frequently scrutinized through motions to suppress evidence collected in violation of the Fourth Amendment. n117 But this process generally eludes the targets of surveillance. When the government gathers information for the purposes of criminal prosecution and seeks to introduce it as evidence at trial, only the individual about whom the information was gathered--the criminal defendant--will have the opportunity to challenge the government's actions through a suppression motion. n118 This means that these practices will face challenges in those circumstances where the government's case is most compelling--when a guilty person seeks to exclude probative inculpatory evidence. n119 Moreover, much of the government's intelligence-collection activity never leads to prosecution. As a result, innocent targets of surveillance--those whose information is collected because it is deemed "relevant" to an investigation, or members of a house of worship who change their religious practices due to fear of surveillance--will be unable to invoke judicial protection. n120 AT: Solvency Deficit --- Congress Specific Congress can’t solve --- strong incentives will discourage effective follow through Berman, 14 --- Visiting Assistant Professor of Law, Brooklyn Law School (Winter 2014, Emily, Washington & Lee Law Review, “Regulating Domestic Intelligence Collection,” 71 Wash & Lee L. Rev. 3, Lexis, JMP) The accountability gap left by the absence of judicial review will not be filled by legislative or public scrutiny. The origin story of the original Attorney General Guidelines included a significant role for Congress. n121 Having been prompted by the Church [*35] Committee's findings of misconduct and the resulting public outrage, the legislature was intimately involved in developing the contents of the Guidelines. n122 Congress held a series of hearings on the issue over the course of several years, and saw its suggestions ultimately reflected in the Levi Guidelines. n123 Given that the Guidelines were implemented, at least in part, to avoid more stringent legislative action, n124 this is not a surprise. Surely Attorney General Levi knew that if the rules he instituted did not appear to address Congress's concerns, they would fail to sap the momentum for enacting a statutory charter for the FBI. The contemporary political economy of congressional oversight in this area means that legislative oversight will not provide any more effective a check than judicial action. Legislators' incentives weigh against aggressive involvement. The downside risks of unsuccessful counterterrorism policies (additional attacks) are high. n125 If those policies are developed outside of the legislative process, Congress can share (if not entirely evade) blame. Moreover, counterterrorism policy "is a subject matter that is especially prone to legislative delegation because it often entails hard trade-offs," which are the types of questions Congress is least likely to address. n126 In addition to undermining legislative involvement in counterterrorism policy formulation, existing institutional features also render [*36] congressional oversight of domestic intelligencecollection policy ineffectual. Congress, of course, retains oversight authority over the FBI. n127 If it wants to play a more active role in overseeing the Guidelines, it has the tools to do so. n128 After all, Congress determines whether and to what degree the FBI's intelligence-collection activities are funded. n129 Moreover, the relevant committees of jurisdiction conduct regular oversight hearings at which the Attorney General and FBI Director appear. n130 Legislators can ask Justice Department and FBI officials for information about the Guidelines or the FBI's activities at any time. n131 Perhaps as a result of the existing incentive structure, however, Congress has shown little appetite to pursue Guidelines-related issues of late. n132 The most recent modification to the Guidelines, for example, failed to reflect congressional input. The Justice Department provided the Senate Judiciary [*37] Committee a completed draft of the Mukasey Guidelines a few months before they were implemented. n133 A handful of senators requested that Attorney General Mukasey delay their implementation until Congress had the opportunity to develop suggestions regarding ways to minimize civil liberties concerns. n134 Their request went unanswered. And even when FBI Director Robert Mueller III inaccurately testified in 2010 before Congress that the FBI did not have the authority to conduct unpredicated investigations, legislators took no follow-up action. n135 AT: Doesn’t Curtail Surveillance Attorney General Guidelines have the capability to curtail surveillance --- only recently has there been a departure from those past restrictions Berman, 14 --- Visiting Assistant Professor of Law, Brooklyn Law School (Winter 2014, Emily, Washington & Lee Law Review, “Regulating Domestic Intelligence Collection,” 71 Wash & Lee L. Rev. 3, Lexis, JMP) Over time, both the Bureau's focus and the rules governing its activities have swung back and forth along the spectrum between the targeted investigations of crime solving and the broader intelligence gathering associated with prevention. The Guidelines themselves are the product of the FBI's early-1970s move away from intelligence collection. After the United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities, commonly known as the Church Committee for its chair Senator Frank Church (D-ID), [*13] revealed that decades of unregulated intelligence collection by the FBI had resulted in widespread abuses of the government's investigative powers, n29 Congress determined that the FBI should be subject to a legislative charter setting out strict limits on its intelligence-collection authority. n30 In an effort to stave off potentially more restrictive legislative action, President Gerald Ford's Attorney General, Edward Levi, issued in 1976 the first set of Attorney General's Guidelines--known as the Levi Guidelines. n31 The Levi Guidelines strictly curtailed domestic intelligence investigations through a basic regulatory structure that subsequent versions of the Guidelines have largely retained. n32 [*14] This structure consists of multiple investigative levels. For each successive level, a higher threshold of suspicion is necessary to proceed; the investigative tools agents may use are more intrusive; and procedural safeguards, such as the need for supervisory approval and limits on the temporal length of investigations, are more robust. n33 The Guidelines continue to function as the primary constraint on the FBI's operations and remain a justification for the lack of a statutory charter governing the FBI's activities, but they have not remained static. n34 Multiple modifications made in the years between 1976 and 2001 eased, though ultimately retained, restrictions on intelligence collection. n35 With 9/11, however, came a wholesale rejection of the anti-intelligence-collection mindset of the Levi era, resulting in a dramatic shift in favor of an aggressive prevention paradigm. The FBI's prioritization of preventing terrorism was reflected not only in the allocation of its resources, its focus, and its conception of its core mission but also in some dramatic modifications to the Guidelines themselves. n36 The eventual result was a set of [*15] Guidelines--which were implemented by Attorney General Michael Mukasey in 2008 and remain in effect today--embodying an unprecedented license for domestic intelligence collection and delegating to the FBI responsibility for imposing limits on that power. n37 AT: No Enforcement Justification requirements create incentives for agencies to follow the impact statement – the Inspector General will make up for the secret nature of the process Berman, 14 --- Visiting Assistant Professor of Law, Brooklyn Law School (Winter 2014, Emily, Washington & Lee Law Review, “Regulating Domestic Intelligence Collection,” 71 Wash & Lee L. Rev. 3, Lexis) B. Oversight of Procedural Requirements One possible objection to this Article's proposals is that, in eschewing judicial review and conceding the secret nature of the Guidelines regime, they relinquish all means of enforcing their requirements. As with the proposed procedural rules themselves, however, the principles behind the administrative state's compliance mechanisms offer a (partial) solution. n332 Notice-and-comment rulemaking employs the transparency of the rulemaking process followed by public and judicial review to enforce the regulatory regime to which agency decision making is subjected. n333 The public's role in that regime is to play watchdog. Because rulemaking and its results are conducted in a transparent fashion, interested stakeholders can be relied upon to object if they believe that an agency has not acted appropriately. n334 The public will scrutinize not only proposed rules to ensure that they do not suffer from procedural, logical, or evidentiary deficiencies, but also any information that is made public as part of the process. If, for example, an Environmental Impact Statement predicts dire environmental consequences from a proposed agency action, environmental activists will use that [*86] Statement to lobby not only the agency but also Congress and the President to prevent the agency from taking the proposed action. n335 Another important compliance-related element of public scrutiny is the fact that it can lead to legal challenges to agency rules. If a regulated entity believes that a regulation applied to it was adopted through flawed procedures, it can bring suit, thereby subjecting the regulation to judicial review. n336 Through this review, courts serve to confirm that agency decisions are not unjustified exercises of discretion and that they followed the mandated procedures. n337 Consequently, courts engage in a "searching and careful" review of the record an agency makes of its decision-making process n338 and will invalidate the results of proceedings that are "arbitrary, capricious, an abuse of discretion, or otherwise not in accordance with law." n339 These standards are not necessarily particularly stringent, but like public scrutiny, [*87] they do ensure that agency decisions have been reached through the proper procedures and therefore that they are reasoned rather than arbitrary or irrational. Perhaps just as importantly, the roles that the public and the courts play impose an important "prior restraint" on agencies. Knowing that their rules and the justifications that they offer for them will be public and potentially subject to judicial scrutiny, agencies will be more likely to be conscientious, hoping to ensure that their decision-making processes pass judicial muster. n340 In other words, they will take any procedural requirements seriously from the outset knowing that, if they do not, any resulting rule could ultimately be invalidated. Fashioning equally effective means of supervising Justice Department or FBI compliance with any relevant rules is a challenge, because the transparency that facilities both public scrutiny and judicial review is concededly difficult to replicate. Any proceedings regarding the Guidelines that take place outside of public view are shielded from the public-as-watchdog. If the relevant rules were legislatively mandated, challenges to any failure to abide by them theoretically could be reviewed by the courts. n341 But even in the unlikely event that Congress imposes procedural requirements akin to those suggested here, such suits will fall prey to the same barriers that currently exist to challenging the FBI's intelligence-collection activities--any individual or entity seeking to challenge the Guidelines or the DIOG on the grounds that they did not follow the required procedures would struggle to establish standing and to overcome the state secrets privilege. n342 As with the reforms suggested to channel the Justice Department's discretion and to improve the participatory nature of the Guidelines' development process, ensuring compliance with procedural requirements would necessitate a means of approximating the traditionally public and judicial roles. One [*88] option in this regard would be to enlist proxies within the executive branch to engage in scrutiny of the decision-making process, to inquire whether the process complied with any required procedures, and to consider whether the required statement(s) of justification are adequate. A government watchdog could be assigned to take the place of the public and judicial watchdogs that normally play this role. n343 The Justice Department's Inspector General (IG)--who is statutorily empowered to conduct audits, investigations, inspections, and reviews of Justice Department programs and to issue reports to Congress regarding the results of any investigations that it does conduct--might play a constructive role in holding the Attorney General and FBI Director accountable for following any applicable procedural rules. The IG investigates not only alleged violations of the law by DOJ employees, but also audits and inspects DOJ programs regularly. n344 That office could perform reviews of the process employed each time the Guidelines or the DIOG are amended. Audits conducted by the IG would be especially effective in replicating the effects of traditional transparency if the results of those audits could be released publicly. Indeed, IGs have, at times, played quite important roles in uncovering violations of law and policy in pursuit of security. n345 Perhaps more than any other oversight mechanism (with the exception of unlawful leaks of classified information), audit reports from the Justice Department's Inspector General have shed light on the FBI's investigative activities in the wake of 9/11. These reports, some of which revealed violations of law or [*89] policy, drew both public and congressional attention, and consequently prompted changes to internal FBI policy. n346 To be sure, even publicly released IG conclusions would lack some of the other compliance-enhancing characteristics of public and judicial scrutiny. The IG does not have the power to invalidate rules that are adopted through flawed procedures or lack sufficient justification. It can point out flaws and insufficiencies, but ultimately any findings or recommendations would be nonbinding. This absence of compulsory power sacrifices some of the sword-of-Damocles threat inherent in the promise of judicial review. If, however, the findings and recommendations can be made public, the threat of reputational costs to the FBI still imposes some ex ante incentive to comply with required procedures. And IGs have been particularly successful in generating public reports for reviews of even the most sensitive programs. n347 Civil Liberties Impact Statement will force information assessments that facilitate oversight efforts from the public, the legislature, or internal watchdogs and check government abuses Berman, 14 --- Visiting Assistant Professor of Law, Brooklyn Law School (Winter 2014, Emily, Washington & Lee Law Review, “Regulating Domestic Intelligence Collection,” 71 Wash & Lee L. Rev. 3, Lexis, JMP) Generating Information. More promising models of reconciling conflicting priorities are focused on agency culture, rather than agency structure. One mechanism for placing pressure on agency culture and prompting decision makers to consider factors that they otherwise might not give much weight is a requirement that an agency generate certain types of [*71] information. According to Professor Eric Biber, for example, "[a] major goal of NEPA was to force agencies that formerly had focused too heavily on primary missions such as highway construction, water-project development, or the extraction of natural resources, to also consider the impacts of their actions on the environment." n272 To accomplish this goal, NEPA requires all federal agencies proposing actions that will "significantly [affect] the quality of the human environment" to prepare an Environmental Impact Statement and make copies available to the public for written comments. n273 These statements augment the information available to agencies, including the possible impacts on the environment, and proposals about how to avoid adverse environmental effects. n274 And commentators agree that NEPA has been successful in integrating environmental goals into agency decision making. n275 Similarly, all agencies--including the FBI--must generate a Privacy Impact Assessment (PIA) for "any substantially revised or new Information Technology System" n276 that collects, maintains, or disseminates personally identifiable information from or about members of the public. n277 And the Department of Homeland Security's Office of Civil Rights and Civil Liberties generates Civil Rights and Civil Liberties Impact Assessments when required to do so by statute, when [*72] they are requested by Department officials, or when the Officer for Civil Rights and Civil Liberties believes it appropriate. n278 Generating these assessments not only facilitates oversight efforts from the public, the legislature, or internal watchdogs, but--like requiring written justifications for changes--it has other benefits as well. As an initial matter, it forces agency decision makers to consciously consider the impact their proposed policy will have. n279 As one set of commentators put it, "a systematic review of potential impacts during the planning process can focus the attention of decision makers on issues that they would otherwise deem to be outside their agency's mandate." n280 Requiring that effort will, at times, lead to agency choices more solicitous of the issue on which the assessment is focused. Decision-makers might simply need to be made aware of the impact of their choices. In addition, they will recognize that the substance of the assessment will be subject to scrutiny and, perhaps, criticism that they would rather avoid. And by ensuring that this information is before the decision makers while they are engaged in the decision-making process--rather than after the fact--makes the exercise all the more likely to have an impact. n281 In addition, DHS's Privacy Office Official Guidance on Privacy Impact Assessments notes that the use of PIAs "demonstrates to the public and to Congress" that the new systems "have consciously incorporated privacy protections," contributing to the legitimacy of the systems. n282 In order to ensure that the Attorney General or FBI Director consider explicitly specific "secondary" goals, he or she should be required to prepare a "Civil Liberties Impact Statement," [*73] articulating the likely effects of any proposed changes to the Guidelines. Requiring the Attorney General to consider, and to explain, whether the cost to civil liberties of any particular rule or tactic outweighs its investigative benefits is sure to raise the profile of civil liberties protection in the decision-making process. And while these Statements will not include the detailed scientific analysis that forms part of Environmental Impact Statements, they will identify the potential civil liberties impacts of proposed rules and force government officials both to note those impacts, and to think about what steps can be taken to mitigate them. Strong PCLOB role will force the FBI to internalize the protection of civil liberties Berman, 14 --- Visiting Assistant Professor of Law, Brooklyn Law School (Winter 2014, Emily, Washington & Lee Law Review, “Regulating Domestic Intelligence Collection,” 71 Wash & Lee L. Rev. 3, Lexis, JMP) Inter-Agency Lobbying. A final mechanism the administrative state has used successfully to force agencies to consider specific, under-emphasized perspectives is for the political branches to enlist other agencies to police the primary decision-making agency. This idea, too, has potential in the Guidelines context. In some ways, this approach is simply a form of expanding the scope of participation, including a "lobbying" agency in the decision-making process to represent a particular interest that the decision-making agency is required to consider. n283 In other words, for the lobbying agency, its primary mission is to promote an interest that may be a "secondary" goal to the decision-making agency. This approach can differ from merely expanding participation in the process in that it envisions a more active role for the lobbying agency than merely providing a particular view to the decision maker. Again, a recommendation already mentioned provides an example. Recall Professors DeShazo and Freeman's study about the licensing practices of the Federal Energy Regulatory Commission and the impact of Congress's requirement that the Commission consult with fish and wildlife agencies prior to issuing licenses. n284 They concluded that this requirement had a real impact on the Commission's treatment of the fish and wildlife agencies' concerns. n285 [*74] Conferring a role in the decision-making process on an agency whose priority is the protection of fundamental rights might mitigate concerns that the FBI's primary mission will unnecessarily endanger civil liberties. The Attorney General might, for example, be required to include officials from such an agency in the process of devising the FBI's investigative rules--to give them a seat at the table. Just as including the Fish and Wildlife Service in agency decision making ensures that decisions take animal habitats into account, including an agency like the PCLOB could play a similar role with civil liberties concerns in the intelligence-collection context. n286 Members and staff of the board--many of whom, unlike staff at the Office of the Director for National Intelligence (ODNI) or FBI charged with protecting civil liberties offices, are drawn from the privacy and civil liberties advocacy community n287--could raise civil liberties concerns that particular rules present, offer alternative means of achieving the FBI's desired ends, suggest procedural protections that should accompany particular rules, or argue that certain rules should not be approved at all. Most importantly, ensuring an entity such as the PCLOB a seat at the table means that there is a voice actively involved in the process whose primary concern is not necessarily the prevention of terrorist acts. While this type of interagency influence exertion can happen informally, n288 the regulatory or legislative creation of more hierarchical forms of agency interaction to vindicate "secondary" goals is likely more effective. Such a hierarchical structure causes decision makers to regulate in the "shadow" of that lobbying agency, prompting the decision-making agency "to internalize the [*75] secondary mandates." n289 Consider the role of the OIRA, through which the Executive Office of the President monitors regulation. n290 A presidential order places OIRA in a hierarchical position over federal agencies to evaluate whether the benefits of agencies' proposed rules exceed their costs. n291 And OIRA has the power not just to make suggestions for modifications but actually to block implementation of an agency regulation on this basis. n292 This "veto" power requires those agencies to take into account what they might consider a secondary goal-efficiency--when contemplating regulatory action. n293 As with the requirement that the Attorney General or FBI Director consider input from particular entities, the impact and effectiveness of this model would be highly contingent on the degree to which Justice Department officials were obligated to take the PCLOB's opinions into account. n294 An agency statutorily empowered to overrule DOJ proposals would have enormous practical effect. But such drastic (and implausible) measures are not required. Again, there are a range of possible roles for the PCLOB. For example, it could simply be given a seat at the table during the formulation of the Guidelines, allowing its representative to raise civil liberties concerns. n295 Or a stronger [*76] thumb on the scale of civil liberties might be to require a report to Congress about any instances in which the PCLOB and the Attorney General or FBI Director are unable to reach agreement on a particular issue. n296 In sum, the procedural framework for the Guidelines should explicitly require that the Attorney General or FBI Director take into account the civil liberties costs when weighing policy options by preparing a "Civil Liberties Impact Statement" detailing the likely impact of the proposed changes on fundamental rights, and should empower the PCLOB to play an active role in formulating the Guidelines. These suggested procedures will not eliminate all concerns about civil liberties raised by the Guidelines and the DIOG. But in a context where preferred methods of rights protection break down, they offer a second-best option. n297 AT: CP Process is Burdensome / Costly Potential costs or personnel tradeoffs are productive --- they will serve as a barrier to arbitrary or unnecessary changes Berman, 14 --- Visiting Assistant Professor of Law, Brooklyn Law School (Winter 2014, Emily, Washington & Lee Law Review, “Regulating Domestic Intelligence Collection,” 71 Wash & Lee L. Rev. 3, Lexis, JMP) A final preliminary note: implementing these reforms would not be costless. As an initial matter, any increase in the onerousness of modifying the Guidelines creates pressure to shift [*49] policy-making decisions to a level where these rules do not apply, making accountability even more elusive. For this reason, any efforts at reform would have to apply to changes to the DIOG as well as the Guidelines, and consider ways to prevent further devolution of decision-making responsibility. These suggested changes would also, of course, consume time and personnel not currently devoted to the Guidelines. But these costs need not be prohibitive. As an initial matter, the costs themselves would impose a potentially valuable barrier to arbitrary or unnecessary changes. Only when changes are in fact necessary will the Attorney General or FBI Director undertake the amendment process. Moreover, the Guidelines and DIOG are modified so infrequently that the need to allocate additional resources to the project would be rare. If implemented effectively, these rare additional costs would be justified by their benefits. AT: SQ Laws Prevent the CP Very few statutory or constitutional constraints --- Justice Department and FBI set their own internal rules Berman, 14 --- Visiting Assistant Professor of Law, Brooklyn Law School (Winter 2014, Emily, Washington & Lee Law Review, “Regulating Domestic Intelligence Collection,” 71 Wash & Lee L. Rev. 3, Lexis, JMP) In this Part, Section A demonstrates the scope of some of the FBI's contemporary intelligence-collection powers and their potential to create tension with privacy; rights of association, expression, and religious exercise; and equal protection principles. n38 Section B then argues that the absence of nondoctrinal checks-whether practical, judicial, political, or [*16] structural--on domestic intelligence collection means that the only constraints on the FBI's intelligence-collection powers are the internal rules that the Justice Department and the FBI have imposed on themselves. A. The Scope of the FBI's Intelligence-Collection Powers Statutory and constitutional doctrine provides very few limits on government access to a vast amount of information about innocent Americans. n39 Any information that we have disclosed to a third-party individual or business entity, for example, lacks Fourth Amendment protection against unreasonable searches and seizures. n40 Thus the Constitution places no limits on the collection of information contained in credit card transactions, bank records, Internet service provider (ISP) records, Amazon.com transaction histories, Facebook activities, electronic toll records, cell-tower location data (in some jurisdictions n41), and even statements made to undercover agents or government informants--regardless of whether the agent or informant discloses his intention to share the contents of the conversation. n42 The First Amendment similarly lacks purchase [*17] here. Intelligence-collection powers that impact religious practice would likely run afoul of the Free Exercise Clause as a facial matter only if they were being implemented with the purpose of suppressing religious exercise. n43 And if the Guidelines chill expression or curtail association, the activities they permit would be immune to facial constitutional challenge so long as they were narrowly tailored to further the compelling interesting in preventing terrorism, an interest that has been afforded great weight by the courts. n44 Statutes provide only slightly more protection. n45 The permissiveness of the doctrine means that the FBI's intelligence-collection powers face very few external legal constraints. In this doctrinal vacuum, the Attorney General was able to make several post-9/11 amendments to the Guidelines that facilitate an aggressive intelligence-collection role for the FBI. The first relevant amendment is the Guidelines' expression of the FBI's newly adopted preventive mission. Specific language explicitly affirms the FBI's role in the intelligence community and specifies authority to collect, retain, and analyze information for intelligence purposes. The Guidelines declare that "[t]he FBI is an intelligence agency as well as a law enforcement agency . . . [whose] functions accordingly extend beyond limited [*18] investigations of discrete matters" n46 and urge the Bureau to use its analytic authority to "identify and understand trends, causes, and potential indicia of criminal activity and other threats to the United States that would not be apparent from the investigation of discrete matters alone." n47 To facilitate this analytical project, the Guidelines provide that all information collected "at all stages of investigative activity is . . . to be retained and disseminated for [intelligence purposes to facilitate the solution and prevention of crime, protect the national security, and further foreign intelligence objectives] regardless of whether it furthers investigative objectives in a narrower or more immediate sense." n48 Even information that wholly exonerates a group or individual from suspicion remains in government databases for storage, analysis (sometimes by algorithmic data-mining), and dissemination for inclusion in other government agencies' databases. n49 AT: Permutation – Do the CP ***note when prepping file --- a longer version of this ev is the “2nc Must Read” block Permutations severs --- doesn’t mandate curtailment of government surveillance. It just institutes a process that might in the future result in reduced FBI powers. Berman, 14 --- Visiting Assistant Professor of Law, Brooklyn Law School (Winter 2014, Emily, Washington & Lee Law Review, “Regulating Domestic Intelligence Collection,” 71 Wash & Lee L. Rev. 3, Lexis, JMP) ***Note – APA = Administrative Procedure Act [*46] Given the appropriate political environment, there are at least three reasons to think that the imposition of a framework like the one suggested here is not entirely implausible. As an initial matter, there is the FBI's concern over legitimacy. The Bureau's ability to succeed in its mission requires constructive relationships with the communities in which it operates. n168 Yet its aggressive intelligence-collection tactics-and their concentration in Muslim communities--has alienated many members of that community, raised suspicion and distrust of the Bureau in some quarters, and undermined cooperative relationships. n169 Improved governance is thus not the only benefit that would flow from implementing APA-like procedures; institutionalizing rulemaking procedures would also yield improvements in community relations, public perceptions of legitimacy, and consequently, FBI effectiveness. In addition, government documents and scholarly commentary are replete with arguments about the value of process in legitimating government action. n170 The FBI's practice of reaching out to nongovernmental organizations in anticipation of issuing new intelligence-collection rules indicates an awareness of the benefits of generating the support of outside stakeholders. n171 Subjecting itself to a set of procedural rules would go far in this regard. And finally, none of the proposals here are substantive. They do not call upon the FBI to cede any particular powers, or to discontinue existing policy. Indeed, they acknowledge the Attorney General's and FBI's role in generating the rules by which the FBI operates, so long as they can show [*47] both that changes in the FBI's authority are needed and that the proposed changes are reasonable ones. And finally, when it comes to imposing limits on government actors, broad procedural frameworks often face less opposition than substantive policy changes. n172 A second preliminary note concerns the role of the APA. While several of the proposed reforms are inspired by provisions of the APA, this Article does not argue that the APA's procedural rules apply to the FBI as a matter of binding law. n173 In fact, it does not take a position with respect to whether the Guidelines or the DIOG constitute legislative rules subject to APA requirements, or whether they represent informal guidance documents or "rules of agency organization, procedure, or practice," which are explicitly exempt from many of the APA's constraints. n174 Instead, the Article looks to the way the APA and other sources of administrative law address particular concerns and argues that intelligence-collection governance would benefit from implementing procedures inspired the animating principles behind these sources of administrative law. Reject severance --- prevents testing the opportunity costs of the plan with counterplans and disadvantages. They are disingenuous --- the 1ac is littered with references why external controls are necessary for the FBI. The CP takes a very different approach that promotes internal, agency based limitations. Relevant scholarly literature also proves the counterplan is a competing policy option --- you should defer to lit because that is the source of topic education and legal experts have a much greater understanding of policy precision. Berman, 14 --- Visiting Assistant Professor of Law, Brooklyn Law School (Winter 2014, Emily, Washington & Lee Law Review, “Regulating Domestic Intelligence Collection,” 71 Wash & Lee L. Rev. 3, Lexis, JMP) 2. Relieving the Tension Among Multiple Missions Fortunately, several administrative law strategies suggest ways to ensure that the Guidelines regime sufficiently takes into account civil liberties concerns as well as security concerns. n258 Though all of the options discussed below are possible paths to follow, the final two approaches discussed below seem particularly promising. Congress Reclaims Authority. One option, of course, is for Congress simply to relieve an agency of responsibility for one of [*68] the competing goals, reclaiming that decision-making authority for itself. n259 Following revelations of civil liberties violations in the 1970s, Congress reclaimed some decision-making authority regarding the executive's surveillance powers by enacting the Foreign Intelligence Surveillance Act (FISA). n260 Or Congress could generate more piecemeal limitations, barring particular techniques that pose threats to civil liberties, or defining the circumstances under which such techniques could be used. Congress could, for example, statutorily reinstate the rule regarding the use of undercover agents to investigate First Amendment protected activities as it existed in the Guidelines in 2001, which required that the FBI have probable cause or a reason to believe a crime had been committed before sending an agent into the meetings of a religious or political group. n261 Congress need not legislate to bring such changes about. If Congress wanted to alter particular investigative tactics, or even to pressure the Justice Department to adopt of its own volition the type of procedural framework suggested in this Article, it has an array of tools at its disposal to press for its desired policy change. Just the threat of legislation, so long as it is credible, can spur executive action. Recall that the original Attorney General's Guidelines were implemented to sap the momentum from Congress's efforts to enact a legislative charter for the FBI. n262 So long as the option of enacting an FBI charter remains a viable means for Congress to limit the Attorney General's discretion when it comes to FBI investigations, the threat of such legislation can be used to press for Congress's desired policy outcomes. Congress possesses carrots as well as sticks--its control over the FBI and Justice Department's budget also can impose a great [*69] deal of pressure for policy change. Given the political economy of this policy area, n263 however, reliance on Congress to reconcile the tension between the FBI's security mission and civil liberties is not the most promising route. Separate Agency Functions. Another way that the administrative state deals with competing mandates is to separate agency functions, assigning one mandate to another (new or pre-existing) agency and leaving each free to focus solely on its own particular mandate. The APA's requirement that investigative and adjudicative functions be separated from one another, thereby insulating some decision making from possibly biased influences, n264 is a way to implement this division-of-functions idea within a single agency. Professor Rachel Barkow has advocated, for example, for the separation of adjudicative and enforcement functions within prosecutors' offices. n265 And in the domestic investigative context, the United Kingdom offers an illustration. Rather than relying on one agency both to enforce criminal laws and to collect intelligence, those functions are divided between two different agencies. n266 The police forces investigate crimes and enforce criminal law, and MI5 collects intelligence. n267 Some commentators have argued that the United States should consider more closely the idea of spinning off the FBI's intelligence-collection function into an independent agency. n268 This alone would not, of course, address many of the concerns that the FBI's current powers raise. But it is possible that, recognizing the special threats to civil liberties that [*70] intelligence collection poses, an agency designed solely for that purpose would be subjected to more stringent limits. Indeed, to prevent overreaching, MI5's expansive intelligence-collection powers do not include arrest or detention authority. n269 Thus powers that are necessary for successful anti-crime efforts could nonetheless be off-limits or curtailed for the intelligence agency. This division-of-functions solution, whether within or between agencies, is also unlikely to garner much support in the Guidelines context. As an initial matter, congressional passivity with respect to intelligence oversight will undermine any legislative efforts in this direction. But more importantly, many of the reforms to the intelligence community's structure in the past decade-plus have been explicitly designed to consolidate, rather than separate, functions. Perceived information-sharing failures prior to 9/11 led to a chorus of calls for breaking down barriers both within and between agencies, n270 and both Congress and the executive branch have responded. The USA PATRIOT Act's removal of the so-called "wall," which barred coordination between law enforcement and intelligence officials, is perhaps the most well-known, though by no means the only, post-9/11 change along these lines. n271 Regardless of the salutary impact that separation of functions might have on civil liberties, the perceived security value of consolidation means that neither Congress nor the executive seems likely to reverse this trend. Generating Information. More promising models of reconciling conflicting priorities are focused on agency culture, rather than agency structure. One mechanism for placing pressure on agency culture and prompting decision makers to consider factors that they otherwise might not give much weight is a requirement that an agency generate certain types of [*71] information. According to Professor Eric Biber, for example, "[a] major goal of NEPA was to force agencies that formerly had focused too heavily on primary missions such as highway construction, water-project development, or the extraction of natural resources, to also consider the impacts of their actions on the environment." n272 To accomplish this goal, NEPA requires all federal agencies proposing actions that will "significantly [affect] the quality of the human environment" to prepare an Environmental Impact Statement and make copies available to the public for written comments. n273 These statements augment the information available to agencies, including the possible impacts on the environment, and proposals about how to avoid adverse environmental effects. n274 And commentators agree that NEPA has been successful in integrating environmental goals into agency decision making. n275 Similarly, all agencies--including the FBI--must generate a Privacy Impact Assessment (PIA) for "any substantially revised or new Information Technology System" n276 that collects, maintains, or disseminates personally identifiable information from or about members of the public. n277 And the Department of Homeland Security's Office of Civil Rights and Civil Liberties generates Civil Rights and Civil Liberties Impact Assessments when required to do so by statute, when [*72] they are requested by Department officials, or when the Officer for Civil Rights and Civil Liberties believes it appropriate. n278 Generating these assessments not only facilitates oversight efforts from the public, the legislature, or internal watchdogs, but--like requiring written justifications for changes--it has other benefits as well. As an initial matter, it forces agency decision makers to consciously consider the impact their proposed policy will have. n279 As one set of commentators put it, "a systematic review of potential impacts during the planning process can focus the attention of decision makers on issues that they would otherwise deem to be outside their agency's mandate." n280 Requiring that effort will, at times, lead to agency choices more solicitous of the issue on which the assessment is focused. Decision-makers might simply need to be made aware of the impact of their choices. In addition, they will recognize that the substance of the assessment will be subject to scrutiny and, perhaps, criticism that they would rather avoid. And by ensuring that this information is before the decision makers while they are engaged in the decision-making process--rather than after the fact--makes the exercise all the more likely to have an impact. n281 In addition, DHS's Privacy Office Official Guidance on Privacy Impact Assessments notes that the use of PIAs "demonstrates to the public and to Congress" that the new systems "have consciously incorporated privacy protections," contributing to the legitimacy of the systems. n282 In order to ensure that the Attorney General or FBI Director consider explicitly specific "secondary" goals, he or she should be required to prepare a "Civil Liberties Impact Statement," [*73] articulating the likely effects of any proposed changes to the Guidelines. Requiring the Attorney General to consider, and to explain, whether the cost to civil liberties of any particular rule or tactic outweighs its investigative benefits is sure to raise the profile of civil liberties protection in the decision-making process. And while these Statements will not include the detailed scientific analysis that forms part of Environmental Impact Statements, they will identify the potential civil liberties impacts of proposed rules and force government officials both to note those impacts, and to think about what steps can be taken to mitigate them. Inter-Agency Lobbying. A final mechanism the administrative state has used successfully to force agencies to consider specific, under-emphasized perspectives is for the political branches to enlist other agencies to police the primary decision-making agency. This idea, too, has potential in the Guidelines context. In some ways, this approach is simply a form of expanding the scope of participation, including a "lobbying" agency in the decision-making process to represent a particular interest that the decision-making agency is required to consider. n283 In other words, for the lobbying agency, its primary mission is to promote an interest that may be a "secondary" goal to the decision-making agency. This approach can differ from merely expanding participation in the process in that it envisions a more active role for the lobbying agency than merely providing a particular view to the decision maker. Again, a recommendation already mentioned provides an example. Recall Professors DeShazo and Freeman's study about the licensing practices of the Federal Energy Regulatory Commission and the impact of Congress's requirement that the Commission consult with fish and wildlife agencies prior to issuing licenses. n284 They concluded that this requirement had a real impact on the Commission's treatment of the fish and wildlife agencies' concerns. n285 [*74] Conferring a role in the decision-making process on an agency whose priority is the protection of fundamental rights might mitigate concerns that the FBI's primary mission will unnecessarily endanger civil liberties. The Attorney General might, for example, be required to include officials from such an agency in the process of devising the FBI's investigative rules--to give them a seat at the table. Just as including the Fish and Wildlife Service in agency decision making ensures that decisions take animal habitats into account, including an agency like the PCLOB could play a similar role with civil liberties concerns in the intelligencecollection context. n286 Members and staff of the board--many of whom, unlike staff at the Office of the Director for National Intelligence (ODNI) or FBI charged with protecting civil liberties offices, are drawn from the privacy and civil liberties advocacy community n287--could raise civil liberties concerns that particular rules present, offer alternative means of achieving the FBI's desired ends, suggest procedural protections that should accompany particular rules, or argue that certain rules should not be approved at all. Most importantly, ensuring an entity such as the PCLOB a seat at the table means that there is a voice actively involved in the process whose primary concern is not necessarily the prevention of terrorist acts. While this type of interagency influence exertion can happen informally, n288 the regulatory or legislative creation of more hierarchical forms of agency interaction to vindicate "secondary" goals is likely more effective. Such a hierarchical structure causes decision makers to regulate in the "shadow" of that lobbying agency, prompting the decision-making agency "to internalize the [*75] secondary mandates." n289 Consider the role of the OIRA, through which the Executive Office of the President monitors regulation. n290 A presidential order places OIRA in a hierarchical position over federal agencies to evaluate whether the benefits of agencies' proposed rules exceed their costs. n291 And OIRA has the power not just to make suggestions for modifications but actually to block implementation of an agency regulation on this basis. n292 This "veto" power requires those agencies to take into account what they might consider a secondary goal--efficiency--when contemplating regulatory action. n293 As with the requirement that the Attorney General or FBI Director consider input from particular entities, the impact and effectiveness of this model would be highly contingent on the degree to which Justice Department officials were obligated to take the PCLOB's opinions into account. n294 An agency statutorily empowered to overrule DOJ proposals would have enormous practical effect. But such drastic (and implausible) measures are not required. Again, there are a range of possible roles for the PCLOB. For example, it could simply be given a seat at the table during the formulation of the Guidelines, allowing its representative to raise civil liberties concerns. n295 Or a stronger [*76] thumb on the scale of civil liberties might be to require a report to Congress about any instances in which the PCLOB and the Attorney General or FBI Director are unable to reach agreement on a particular issue. n296 In sum, the procedural framework for the Guidelines should explicitly require that the Attorney General or FBI Director take into account the civil liberties costs when weighing policy options by preparing a "Civil Liberties Impact Statement" detailing the likely impact of the proposed changes on fundamental rights, and should empower the PCLOB to play an active role in formulating the Guidelines. These suggested procedures will not eliminate all concerns about civil liberties raised by the Guidelines and the DIOG. But in a context where preferred methods of rights protection break down, they offer a second-best option. n297 And, the counterplan gives the PCLOB a veto over the process, means no certain outcome is guaranteed. “Should” means “must” and requires immediate legal effect Summers 94 (Justice – Oklahoma Supreme Court, “Kelsey v. Dollarsaver Food Warehouse of Durant”, 1994 OK 123, 11-8, http://www.oscn.net/applications/oscn/DeliverDocument.asp?CiteID=20287#marker3fn13) ¶4 The legal question to be resolved by the court is whether the word "should"13 in the May 18 order connotes futurity or may be deemed a ruling in praesenti.14 The answer to this query is not to be divined from rules of grammar;15 it must be governed by the age-old practice culture of legal professionals and its immemorial language usage. To determine if the omission (from the critical May 18 entry) of the turgid phrase, "and the same hereby is", (1) makes it an in futuro ruling - i.e., an expression of what the judge will or would do at a later stage - or (2) constitutes an in in praesenti resolution of a disputed law issue, the trial judge's intent must be garnered from the four corners of the entire record.16 [CONTINUES – TO FOOTNOTE] 13 "Should" not only is used as a "present indicative" synonymous with ought but also is the past tense of "shall" with various shades of meaning not always easy to analyze. See 57 C.J. Shall § 9, Judgments § 121 (1932). O. JESPERSEN, GROWTH AND STRUCTURE OF THE ENGLISH LANGUAGE (1984); St. Louis & S.F.R. Co. v. Brown, 45 Okl. 143, 144 P. 1075, 1080-81 (1914). For a more detailed explanation, see the Partridge quotation infra note 15. Certain contexts mandate a construction of the term "should" as more than merely indicating preference or desirability. Brown, supra at 1080-81 (jury instructions stating that jurors "should" reduce the amount of damages in proportion to the amount of contributory negligence of the plaintiff was held to imply an obligation and to be more than advisory); Carrigan v. California Horse Racing Board, 60 Wash. App. 79, 802 P.2d 813 (1990) (one of the Rules of Appellate Procedure requiring that a party "should devote a section of the brief to the request for the fee or expenses" was interpreted to mean that a party is under an obligation to include the requested segment); State v. Rack, 318 S.W.2d 211, 215 (Mo. 1958) ("should" would mean the same as "shall" or "must" when used in an instruction to the jury praesenti means literally "at the present time." BLACK'S LAW which tells the triers they "should disregard false testimony"). 14 In phrase denotes that which in law is presently or immediately effective, as opposed to something that will or would become effective in the future [in futurol]. See Van Wyck v. Knevals, 106 U.S. 360, 365, DICTIONARY 792 (6th Ed. 1990). In legal parlance the 1 S.Ct. 336, 337, 27 L.Ed. 201 (1882).