Privacy Viewed As A Societal Good

advertisement
Table of Contents
Topicality ....................................................................................................................................................... 4
Definitions: Above................................................................................................................................. 5
Ought: Stock Definitions ....................................................................................................................... 6
Ought implies Consequentialism .......................................................................................................... 7
Ought implies Contractarionism ........................................................................................................... 8
Ought Implies Kantian Ethics ................................................................................................................ 9
Ought Implies Naturalism (Meta Ethics) ............................................................................................. 10
Ought implies Rights ........................................................................................................................... 11
Definition of Pursuit ............................................................................................................................ 12
Definition of “Security Threat” ........................................................................................................... 13
“National Security” is Resisting Hostile Action ................................................................................... 14
National Security is Cybersecurity, terrorism, and nuclear weapons ................................................. 15
National Security includes Human Trafficking .................................................................................... 16
“Digital Privacy” .................................................................................................................................. 17
Citizens ................................................................................................................................................ 18
Aff ................................................................................................................................................................ 19
Privacy ..................................................................................................................................................... 20
No Right to Privacy-Constitution......................................................................................................... 21
Limits In Place Prevent Loss of Digital Privacy .................................................................................... 22
Terrorism................................................................................................................................................. 23
Digital Surveillance Stops Inevitable Terrorist Attack ........................................................................ 24
Digital Surveillance Solves Terrorism .................................................................................................. 25
Terrorists Use the Internet to Plan Attacks (1/2)................................................................................ 28
Terrorists Use the Internet to Plan Attacks (2/2)................................................................................ 29
Terrorist Attack Coming ...................................................................................................................... 30
Hackers.................................................................................................................................................... 38
Prism ....................................................................................................................................................... 40
Espionage ................................................................................................................................................ 42
Espionage-Russia................................................................................................................................. 43
Espionage China .................................................................................................................................. 44
Espionage-Iran .................................................................................................................................... 49
Patriot Act ............................................................................................................................................... 50
Patriot Act Balances National Security and Privacy ............................................................................ 51
A2-“Patriot Act Violates Liberties” ...................................................................................................... 52
Wire Taps ................................................................................................................................................ 54
Wiretaps Solve Terrorism ................................................................................................................... 58
Wiretaps Solve Crime .......................................................................................................................... 59
Human Trafficking ................................................................................................................................... 60
Mobile Phone Searches Solve Human Trafficking .............................................................................. 61
Crime Impacts ......................................................................................................................................... 62
Organized Crime Destroys Rule of Law ............................................................................................... 63
Drug Trade Impacts: Drugs & Crime Destroy Society – Laundry List .................................................. 64
Drug Trade Impacts: Drug Money Fuels Terrorism ............................................................................. 65
Drug Trade Impacts: Drug Trade Causes Latin American Instability .................................................. 67
Gangs Impacts: Gangs Cause Crime .................................................................................................... 68
Gangs Impacts: Gangs Key to Drug Trade ........................................................................................... 69
Wikileaks Harms National Security ......................................................................................................... 70
Wikileaks Threatens National Security ............................................................................................... 71
Wikileaks Threatens National Security ............................................................................................... 73
Wikileaks Helps Terrorists ................................................................................................................... 74
Wikileaks Hurts US-Pakistani Relations .............................................................................................. 75
A2: Wikileaks Solves For Transparency ............................................................................................... 76
A2: Wikileaks Solves For Transparency ............................................................................................... 77
Transparency........................................................................................................................................... 78
Uniqueness: Privacy Decreasing Now ................................................................................................. 79
Uniqueness: Privacy Violations Inevitable .......................................................................................... 81
Now is the Key Time for Transparency ............................................................................................... 83
Link: Pretending Privacy Exists Masks Surveillance (1/2) ................................................................... 85
Link: Pretending Privacy Exists Masks Surveillance (2/2) ................................................................... 87
Alternative Solvency: Transparency Checks Government Oppression (1/2) ...................................... 88
Alternative Solvency: Transparency Checks Government Oppression (2/2) ...................................... 91
Neg .............................................................................................................................................................. 92
Privacy ..................................................................................................................................................... 93
Constitution-Right to Privacy .............................................................................................................. 94
Privacy Impacts: Totalitarianism ......................................................................................................... 99
Privacy Impacts: Autonomy .............................................................................................................. 101
Privacy Impacts: Normalization ........................................................................................................ 103
Browser Fingerprinting ..................................................................................................................... 104
A2: “We Consent to Surveillance” .................................................................................................... 107
Equal Prioritization................................................................................................................................ 108
Surveilance Ineffective-Terrorists ......................................................................................................... 116
Hackers Not A Threat ............................................................................................................................ 117
Cyberattacks ......................................................................................................................................... 120
Tech Bad................................................................................................................................................ 121
Meta-Ethics ............................................................................................................................................... 126
Naturalism............................................................................................................................................. 127
Hardwired For Survival...................................................................................................................... 129
Error Theory .......................................................................................................................................... 130
Quasi- Realism....................................................................................................................................... 132
Legality .................................................................................................................................................. 133
Topicality
Definitions: Above
Above means to have a higher rank
Merriam-webster.2013, “Above-Definition and More from the Merriam Webster Free dictionary.”
http://www.merriam-webster.com/dictionary/above
3¶ : in or to a higher rank or number <30 and above>
Ought: Stock Definitions
Ought implies Moral Obligation
Merriuam Webster dictionary, 2013, (http://www.merriam-webster.com/dictionary/ought)
Ought- used to express obligation
Ought- moral obligation
Reasons to prefer
1. Most common sense definition- First Known Use: 12th century, this tells us that this form of definition
has been appropriate for a long time.
2. Meriam Webster is a total access dicitionairy- everybody can access it meaning that people have the
ability to get the definition.
3. For more than 150 years, in print and now online, Merriam-Webster has been America's leading and
most-trusted provider of language information.
4. All Merriam-Webster products and services are backed by the largest team of professional dictionary
editors and writers in America, and one of the largest in the world.
Ought is defined as mandatory.
Black’s Law Dictionary. http://thelawdictionary.org/ought/
This word, though generally directory only, will be taken as mandatory if the context requires it. Life
Ass’n v. SL Louis County Assessors, 49 Mo. 518.
Ought implies Consequentialism
Ought is a propositional operative that questions if a consequence from an action is
desirable
Wedgwood argues. (Ralph, English prof @ carniege melon, “modern day morals.” No date, http://wwwbcf.usc.edu/~wedgwood/meaningofought.htm)
“We can avoid all these problems if we treat ‘ought’ in as a propositional operator. Grammatically,
‘ought’ in English is an auxiliary verb, like the modal auxiliaries ‘can’ and ‘must.’ When an occurrence of
‘ought’ modifies the main verb of a sentence, it can be taken as a propositional operator applying to the
proposition that would be expressed by the unmodified form of that sentence. Thus, the sentence
drinking water ought to be clean and safe in ‘ought’ is a propositional operator applying to the
proposition that would be expressed by the sentence ‘drinking water is clean and safe’”
Ought implies Contractarionism
The governmental obligation focuses on what the people want
Terrence O. Moore, Professor of History at Hillsdale College, degree from u of Chicago, “What Ought
Government to Do (and Not Do)?: Why We Need to Read John Locke” September 1, 2011,
http://ricochet.com/main-feed/What-Ought-Government-to-Do-and-Not-Do-Why-We-Need-to-ReadJohn-Locke
Locke’s considerable narrowing of the scope of government is famously echoed in the Declaration of
Independence with these words: “That to secure these rights [Life, Liberty and the pursuit of
Happiness], Governments are instituted among Men.” Securing rights is what government is supposed
to do. Whenever government exceeds the scope of its original compact or commission, people’s liberty
is in danger. Now it is true that a people may consent to employ government to do any number of things
which seem legitimate. But watch out! The oldest trick in the democratic playbook is for a larger group
of people to get together and consent to take the smaller group’s property. ¶ The Lockean idea of
limited government compels us to ask the question: what is government for—and what is it not for?
Allowing for the fact that there may be any number of functions for government at the state and local
levels (via the Founders’ invention of federalism), what ought thefederal government to do and what
ought it not to do? Voters on the Right need to be specific about what their candidates should do (and
undo) once elected lest vague promises of reduced government spending go nowhere and further
electoral victories be wasted.
Ought Implies Kantian Ethics
Kant defines ought as requiring an imperative.
Hurford, Peter. Political Science and Psychology Major at Denison University. November 4, 2011. The
Meaning of Ought, Part I. http://www.greatplay.net/essays/the-meaning-of-ought-part-i
Kant described “ought” as referring to an imperative, defining two types: a hypothetical imperative
and a categorical imperative:¶ A hypothetical imperative is in the form “If you desire X, you ought to
preform action Y”. For instance, “If you value the lives of others, you ought to not murder people” or “If
you value freedom, you ought not to restrict the speech of others”. It is an ought statement
characterized by a conditional.¶ A categorical imperative is in the form “You ought to preform action Y
(regardless of what you believe or desire)”. For instance, “You ought not to lie” or “You ought not to
steal”. It is a pure, unconditional ought statement.
Ought Implies Naturalism (Meta Ethics)
Ought does not imply morality, natural ethics are more clear.
Beavers, Anthony F. Written for the International Digital Ethics Symposium, Center for Digital Ethics and
Policy, School of Communication, Loyola University. Chicago, October 28th, 2011. Could and Should the
Ought Disappear from Ethics?
http://www.academia.edu/1011404/Could_and_Should_the_Ought_Disappear_from_Ethics
Terra Firma¶ In 2007, Anderson and Anderson wrote, “As Daniel Dennett (2006) recently stat-ed, AI
‘makes philosophy honest.’ Ethics must be made computable in order to make it clear exactly how
agents ought to behave in ethical dilemmas” (16). To rephrase their sentiment, a computable system or
theory of ethics serves to make ethics honest. As I have observed elsewhere (Beavers 2010), it is
common among machine ethicists to note that research in computational ethics can help us better
understand ethics in the case of human beings. This is because of what we must know about ethics in
general to build machines that operate within normative pa-rameters. Unclear intuitions will not do
where engineering specifications and computational clarity are required. So, machine ethicists are
forced head on to en-gage in moral philosophy. Their effort, of course, hangs on a careful analysis of
ethical theories, the role of affect in making moral decisions, relationships be-tween agents and
patients, and so forth. But this is not all. There are other meta-ethical difficulties that must be addressed
as well concerning, particularly, the nature of the moral ought and the necessary and sufficient
conditions for moral agency. Every moral theory makes assumptions about these issues, but, to date,
without the clarity that real-world, working specifications for practical application require. Thus,
computational ethics provides us with the¶ terra firma¶ needed to get some solid footing in the
otherwise vague and messy domain of ethics and helps us answer the question of whether (and if so, to
what extent) we may have been duped by morality.¶ My conclusion here will be that yes, we have been
duped, at least in part. As such, I am departing from Beavers 2009 & 2011, where I suggested that we¶
might ¶ (another past subjunctive) have been in order to argue for something more definite. This
conclusion will be an unhappy one for many, since it will involve throwing out an age-old distinction
between being good and merely acting so that has been at the heart of ethics (according to the
dominant Western paradigm)from its inception. My argument will unfold in three parts: the first will
address the question of moral agents (MAs) in general, after which I will examine what precisely¶ ought
¶ implies when viewed from a moral perspective to isolate what I will identify as the paradox of
automated moral agency (P-AMA). Next to avoid the paradox we will need to define the¶ ought ¶
technically, not morally, a distinction I am partially borrowing from Kant and will make clear later, with
the result that we are left with the sufficiency argument (SA), which states that moral interiority is a
sufficient but not necessary condition for moral agency. If this argument holds, then the kind of moral
interiority that allows an agent to be culpable for its actions is not necessary for ethics. It is rather a
product of our biology that drives humans to be ethical, but it is not the only way this can be done. My
motive in taking this approach is that the problems we are facing as a world are so great that it is time to
put aside the “blame game” and confront them with some sort of no-fault ethics, the details of which
have largely been worked out by Floridi (1999and 2002) and Floridi and Sanders (2001 and 2004),
though more work needs to be done here to draw out the implications where blame and fault are
concerned.
Ought implies Rights
Ought is derived from our rights, if we have the right, we have an obligation to act.
Gewirth Alan, a professor of philosophy at the University of Chicago, “THE 'IS-OUGHT PROBLEM
RESOLVED.”, Proceedings and Addresses of the American Philosophical Association, Vol. 47 (1973 -¶
1974), pp. 34-61, jstor)
I have here presented, then, a complex version of what I have ¶ called the internal model of the relation
between 'ought' and 'is'. ¶ I have not directly defined 'ought' in terms of'is'; rather, I have ¶ held that
the application of 'ought' is entailed by the correlative ¶ concept of having a right. The agent's
application of this concept, ¶ in turn, has been derived from the concept of goods which are the ¶
necessary conditions of all his actions, since he necessarily claims ¶ that he has a right to at least
these goods. And the agent's applica- ¶ tion of the concept of good, finally, has been derived from his
¶ acting for purposes. Since the agent's assertion that he acts for ¶ purposes is an empirical, descriptive
statement, I have in this ¶ indirect way derived 'ought' from 'is'. Whether the derivation is at ¶ each
point definitional or is rather of some other non-arbitrary ¶ sort does not materially affect my
argument, so long as its neces- ¶ sary relation to the context of action is recognized.
Definition of Pursuit
Trying to Achieve Something
Oxford Dictionary (2013, Oxford University Press, http://oxforddictionaries.com/definition/english/pursuance?q=pursuance)
the action of trying to achieve something:
Pursuit of Security includes Cost
David A. Baldwin, 1997, Columbia University Department of Political Science, “The Concept of Security”, Review of International
Studies, Jstor, http://www.jstor.org/stable/20097464
The pursuit of security always involves costs, i.e., the sacrifice of other goals that could have been
pursued with the resources devoted to security. Specification of this dimension of security policy is
important because writers sometimes imply that costs do not matter. One writer, for example,
defines national security in terms of the protection of core values, which he describes as 'interests
that are pursued not withstanding the costs incurred'.55 From the standpoint of a rational policymaker, however, there are no such interests. Costs always matter.
Definition of “Security Threat”
Security threats include Natural Disasters.
David A. Baldwin, 1997, Columbia University Department of Political Science, “The Concept of Security”, Review of International
Studies, Jstor, http://www.jstor.org/stable/20097464
In ordinary language, however, one
often finds references to epidemics, floods, earth quakes, or droughts as
'threats' to acquired values. Ullman and others have argued hat the concept of security should be expanded to include such
phenomena. There seems to be no reason not to use this more expansive concept of threats, especially
since it comports with common usage. Those who wish to refer to conditional commitments to punish by social actors as
security threats may make that clear when specifying this dimension of security.
“National Security” is Resisting Hostile Action
“National security” includes activities that threaten society
Department of Defense Dictionary of Military and Associated Terms. No Date (“national
security”. Accessed 17 July 13. http://www.dtic.mil/doctrine/dod_dictionary/data/n/5673.html)
A collective term encompassing both national defense and foreign relations of the United States.
Specifically, the condition provided by: a. a military or defense advantage over any foreign nation or
group of nations; b. a favorable foreign relations position; or c. a defense posture capable of
successfully resisting hostile or destructive action from within or without, overt or covert. See also
security.
National Security is Cybersecurity, terrorism, and nuclear weapons
The 2013 national security strategy highlights security issues as cyber space, terrorism
and nuclear weapons.
NSSA writes 2013 (“National Security Strategy 2013” pg 6, DoP: 2013, DoA: 7/17/13,
http://www.utexas.edu/lbj/sites/default/files/file/news/National%20Security%20Strategy%202013%20(
Final%20Draft).pdf)
This document details the international environment the United States faces ¶ moving forward and depicts how we can navigate a
peaceful and stable order in ¶ the future by leading the global economy, protecting critical global strategic ¶ interests, and maximizing the
disposition and strength of our military. ¶ Furthermore, the
analysis of emerging and persistent national security
issues –¶ cyberspace, terrorism, and nuclear weapons – emphasizes the opportunity of ¶ American leadership.
National Security includes Human Trafficking
National security includes human trafficking
ARTHUR RIZER, Arthur Rizer is a Trial Attorney with the United States Department of Justice. “Breach: The National Security Implications of
Human Trafficking” 2011, http://widenerlawreview.org/files/2011/03/Rizer-Glaser.pdf
Expanding on this concept, former government official
Joseph Romm41¶ argues that national security relates to
events that “(1) threaten drastically and ¶ over a relatively brief span of time to degrade the quality of
life for the ¶ inhabitants of a state, or (2) threaten significantly to narrow the range of policy ¶ choices
available to the government of a state.”42 “Consequently, Romm ¶ includes on the national security agenda issues
of global warming [and] energy ¶ security” 43 and May even include, as this article argues, human trafficking. ¶
Anything could arguably affect the “way of life” of the American people. ¶ However, because President Clinton’s and Mr. Romm’s portrayal of
national ¶ security focuses more on the people of the United States, rather than President ¶ Bush’s general “interests around the globe,” we
believe that President ¶ Clinton’s and, more specifically, Mr. Romm’s definition of national security is ¶ more appropriate for the subject at
hand.
“Digital Privacy”
Digital privacy is defined as a protection of citizens’ privacy
WiseGeek Online. 2013. What Is Digital Privacy? http://www.wisegeek.com/what-is-digitalprivacy.htm
The concept of digital privacy can best be described as the protection of the information of private
citizens who use digital mediums. However, when people speak about digital privacy, they often are referring to it in
terms of its relation to Internet usage. Despite it being a popular and often incendiary issue, the obstacle of defining what digital
privacy really is can prevent resolution.¶ Digital privacy centers on the fact that using digital mediums to conduct affairs, whether personal or
professional, can leave digital footprints. For example, many Internet users don't realize that information about them and their Internet usage
habits are constantly being logged and stored. A computer's Internet Protocol (IP) address can be traced back to a specific user and, as such, his
website viewing habits can be monitored. Information such as the date and time of his searches, what browser he used to access websites and
even how long he viewed websites can be retained on a search engine's servers. Servers can vary in the length of time they store this
information before deleting it.
Citizens
A citizen is defined as someone who is either born in the U.S. or is naturalized.
U.S. Citizenship and Immigration Services. 01/17/2013. Citizenship.
http://www.uscis.gov/portal/site/uscis/menuitem.eb1d4c2a3e5b9ac89243c6a7543f6d1a/?vgnextoid=a
2ec6811264a3210VgnVCM100000b92ca60aRCRD&vgnextchannel=a2ec6811264a3210VgnVCM100000b
92ca60aRCRD
If you meet certain requirements, you may become a U.S. citizen either at birth or after birth. ¶ To
become a citizen at birth, you must:¶ Have been born in the United States or certain territories or
outlying possessions of the United States, and subject to the jurisdiction of the United States; OR ¶
had a parent or parents who were citizens at the time of your birth (if you were born abroad) and
meet other requirements¶ To become a citizen after birth, you must:¶ Apply for “derived” or
“acquired” citizenship through parents¶ Apply for naturalization¶ For more information, see USCIS
Policy Manual Citizenship and Naturalization Guidance. ¶ The Naturalization Test¶ Most naturalization
applicants are required to take a test on:¶ English¶ Civics (U.S. history and government)
An American citizen is one who constitutionally belongs to the United States.
Smith, Roger M. Alfred ¶ Cowles Professor of ¶ Government at Yale ¶ University. 1985. The Meaning of
American Citizenship. http://www.apsanet.org/imgtest/americancitizenship.pdf
What does it mean to say, "I am an American citizen?" The law supplies ¶ dry technical answers: the
statement means that one falls under a ¶ constitutional or statutory category conferring full
membership in the ¶ American polity. The chief ones are, with minor exceptions, birth within ¶ the
United States, which confers citizenship under the Fourteenth ¶ Amendment, plus birth to American
parents overseas, and ¶ naturalization, categories regulated by federal statutes.
Aff
Privacy
No Right to Privacy-Constitution
There is no constitutional basis for the right to privacy.
Harold R. DEMOSS JR, DeMoss practiced law in Houston for 34 years before being appointed in 1991 by former President George H.W.
Bush to the 5th U.S. Circuit Court of Appeals, where he now serves., “Constitutional right to privacy a figment of imagination” DoP:January 15,
2006, DoA: 7/17/13, http://www.chron.com/opinion/outlook/article/Constitutional-right-to-privacy-a-figment-of-1640537.php
In this season of politicized and contentious confirmation hearings to fill vacancies on the U.S. Supreme Court, some of the sharpest
debate
and disagreement concerns
a so-called "right of privacy" in the U.S. Constitution.¶ The
advocates of a constitutional right of privacy speak as though that right were expressly
stated and enumerated in the Constitution. But the text of the Constitution does not
contain the word "privacy" or the phrase "right of privacy."¶ Consequently, in my view, a
constitutional "right of privacy" could only be unenumerated and is therefore a figment
of the imagination of a majority of the justices on the modern Supreme Court. Let me explain why.¶ Webster's Dictionary defines
"enumerate" as "to name or count or specify one by one." Roget's Thesaurus states that the synonyms for "enumerate" are "to itemize, list, or
tick off." Adding the negative prefix "un" reverses the definitions or synonyms so that "unenumerated" means not named, not counted, not
specified, not itemized, or not listed.¶ The right of privacy is unenumerated because neither the word privacy nor the phrase right of privacy
appears anywhere in the Constitution or its amendments. Nor does the text contain any words related to other rights the Supreme Court has
found to derive from that right, including the right to an abortion and rights related to sexual preference. Neither "abortion" nor "sexual
preference" appear anywhere in the text of the Constitution.
Limits In Place Prevent Loss of Digital Privacy
There are restraints placed upon how much digital privacy can be conceded
Palin, Philip J, 9/18/11 , Homeland Security Watch, Brennan: Counterterrorism and the Law,
http://www.hlswatch.com/index.php?s=patriot+act , Date Accessed : 7/17/11
We’ve also worked to uphold our values and the rule of law in a second area—our policies and practices here at home. As I said,
we will
use all lawful tools at our disposal, and that includes authorities under the renewed PATRIOT Act. We
firmly believe that our intelligence gathering tools must enable us to collect the information we need
to protect the American people. At the same time, these tools must be subject to appropriate oversight
and rigorous checks and balances that protect the privacy of innocent individuals.¶ As such, we have ensured
that investigative techniques in the United States are conducted in a manner that is consistent with our laws and subject to the supervision of
our courts. We have also taken administrative steps to institute additional checks and balances, above and beyond what is required by law, in
order to better safeguard the privacy rights of innocent Americans.¶ Our democratic
values also include—and our national
security demands—open and transparent government. Some information obviously needs to be
protected. And since his first days in office, President Obama has worked to strike the proper balance
between the security the American people deserve and the openness our democratic society expects.¶
In one of his first acts, the President issued a new Executive Order on classified information that,
among other things, reestablished the principle that all classified information will ultimately be
declassified. The President also issued a Freedom of Information Act Directive mandating that
agencies adopt a presumption of disclosure when processing requests for information. The President
signed into law the first intelligence authorization act in over five years to ensure better oversight of
intelligence activities. Among other things, the legislation revised the process for reporting sensitive intelligence activities to Congress
and created an Inspector General for the Intelligence Community.¶ For the first time, President Obama released the combined budget of the
intelligence community, and reconstituted the Intelligence Oversight Board, an important check on the government’s intelligence activities. The
President declassified and released legal memos that authorized the use, in early times, of enhanced
interrogation techniques. Understanding that the reasons to keep those memos secret had
evaporated, the President felt it was important for the American people to understand how those
methods came to be authorized and used.¶ The President, through the Attorney General, instituted a new process to consider
invocation of the so-called “state secrets privilege,” where the government can protect information in civil lawsuits. This process ensures that
this privilege is never used simply to hide embarrassing or unlawful government activities. But, it also recognizes that its use is absolutely
necessary in certain cases for the protection of national security. I know there has been some criticism of the Administration on this. But by
applying a stricter internal review process, including a requirement of personal approval by the Attorney General, we are working to ensure
that this extraordinary power is asserted only when there is a strong justification to do so.¶
Terrorism
Digital Surveillance Stops Inevitable Terrorist Attack
Lack of digital surveillance leads to terrorist attacks
Sorcher, Sara. Staff Editor. June 25, 2013. Insiders: NSA's Communications Surveillance Good Way to
Target Terrorists. http://www.nationaljournal.com/nationalsecurity/insiders-nsa-s-communicationssurveillance-good-way-to-target-terrorists-20130624. Accessed 7/16/2013.
The National Security Agency's surveillance programs are effective tools for seeking out terrorists, according to 85.5 percent of National
Journal's National Security Insiders.¶ "In
the digital age, when every individual's digital trail increases year by
year, there is no faster way to draw a picture of a network, or a conspiracy, than by piecing together
different data streams," one Insider said. "This capability, in years to come, won't be a nice-to-have; it'll be
critical."¶ Another Insider said that the NSA must have the tools necessary to root out terrorists or another
9/11 becomes not just possible, but certain. "If we eliminate the online- and phone-surveillance
programs and a dirty bomb explodes in an American city, we have only ourselves to blame," the Insider
said. "The days of gentlemen not reading other gentlemen's mail are over."
Digital Surveillance Solves Terrorism
Digital monitoring is useful, empirically has worked and is relatively simple
Tom Gjelten, NPR international correspondent, 6/15/13, The Case For Surveillance: Keeping Up With Terrorist Tactics,
http://www.npr.org/2013/06/15/191694315/high-tech-surveillance-targets-evolving-terrorist-tactics Date accessed 7/17/13
Since public revelations that the National Security Agency is collecting telephone records and reviewing Internet communications in the U.S. and
abroad, officials have been making the case that the programs are vital. They argue that the tactics match the new ways terrorists are planning and
communicating.¶ There was
a time when America's enemies conspired face-to-face, or communicated
through couriers, or by leaving messages for each other somewhere. But in the digital age, that has
changed.¶ FBI Director Robert Mueller made that point back in 2008, as Congress considered whether to amend the Foreign Intelligence
Surveillance Act.¶ "In this day and age, our ability to gain intelligence on the plans, the plots of those who
wish to attack us is dependent on us obtaining information relating to cellphones, Internet, email, wire transfers, all of
these areas," he said.¶ If all the action was in that electronic space five years ago, it's even more so today, as intelligence and security officials
constantly point out.¶ Speaking in February, the NSA's general counsel, Rajesh De, threw out some figures on the explosive growth in
communication data.¶ "More
data crosses the Internet every second today than existed on the Internet 20
years ago. Global mobile traffic grew 70 percent last year alone," he said.¶ Officials say these trends highlight the
challenge facing spy agencies: With so much communication now taking place in the digital world, intelligence officers have to be able to follow
that communication.¶ James Bamford, the author of several books on the NSA, says spies used to focus on getting human sources inside an
organization — agents who could report on what people in the organization were saying and doing. But human sources no longer matter so much,
Bamford says. Intelligence officers use new approaches because their adversaries are interacting in new ways.¶ "During the day, they're on
cellphones, or they're on email, or they're on social-networking sites. By intercepting that information, you develop patterns and look at who these
people might be involved with," he says.¶ To justify the
NSA's collection of telephone records and its selective
monitoring of online communication overseas, U.S. officials cite these "revolutionary" changes in the
information space. John Negroponte was the director of National Intelligence when wiretapping programs were expanded during the
Bush administration. He defends the NSA's new emphasis. ¶ "I'd say it's a testament to how surveillance methods have kept up with the geometric
progression of these communication methods," he says.¶ Congressional critics of the expanded surveillance operations say they're not convinced
that these programs have really proved their value in fighting terrorism. They ask whether other types of intelligence gathering might be just as
effective.¶ Negroponte, who served as U.S. ambassador to Iraq, says no one method is sufficient. He recalls how in 2006, the
combination
of different intelligence sources led the U.S. military to the head of al-Qaida in Iraq, Abu Musab alZarqawi.¶ "I believe his phone number was detected through human intelligence. Somebody gave us his phone number. Then, that phone
number was monitored through signals intelligence. And then his movements were tracked by geo-spatial intelligence — drones and so forth," he
says. "So it's actually the integration of these different methodologies that actually give you the best results."¶ The
expanded use of
telephone and Internet surveillance is in part an adaptation to the information revolution. The NSA, the
CIA and other agencies will defend these programs vigorously on that basis, despite concerns that Americans' privacy has been put at risk. ¶ But
that's not the whole story: It's also clear that the programs are popular in the spy business simply because they're convenient and efficient. They
make intelligence gathering easier.
Digital surveillance thwarted over 50 possible terrorist threats
Kastrenakes, Jacob. Journalist. June 18, 2013. 'Over 50' terrorist plots were stopped by surveillance
efforts, says NSA director. http://www.theverge.com/2013/6/18/4441774/over-50-terrorist-plotsstopped-NSA-surveillance. Accessed 7/16/2013.
Speaking to a congressional committee this morning, General Keith Alexander revealed that government surveillance
efforts have thwarted “over 50” possible terrorist threats since 9/11, including plans to bomb the New
York Stock Exchange and NYC subway system. Alexander, who heads the NSA, specifically noted that
programs like the Verizon metadata collection may have been able to stop 9/11 if they had been in
place at the time. He suggested that this program as well as “other intelligence” — which he did not disclose — assisted in foiling the 50
or so threats.
Terrorists are using the internet to expand, the United States needs to monitor them.
Richard A. Posner, 2008, Senior Lecturer in Law, The University of Chicago. “Privacy, Surveillance, and Law”, The University of Chicago
Law Review, Jstor, http://www.jstor.org/stable/20141907
Privacy is the terrorist's best friend, and the terrorist's privacy has been enhanced by the same
technological developments that have both made data mining feasible and elicited vast quantities of per sonal
information from innocents: the internet, with its anonymity, and the secure encryption of digitized data which, when combined
with that anonymity, make the internet a powerful tool of conspiracy. The government has a compelling
need to exploit digitization in defense of national security. But if it is permitted to do so, intelligence
officers are going to be scrutinizing a mass of personal information about US citizens. And we know that
many people do not like even complete strangers poring over the details of their private lives. But the fewer of these strangers
who have access to those details and the more profes sional their interest in them, the less the affront
to the sense of privacy. One reason people do not much mind having their bodies examined by
doctors is that they know that doctors' interest in bodies is profes sional rather than prurient ; and we
can hope that the same is true of intelligence professionals.
Preventing Terrorism Necessitates Domestic Spying
We need technology that can gather information against terrorists, even if it
necessitates collecting that of US citizens.
Glenn Sulmasy, 2013, Department of Humanities, Professor of Law, U.S. Coast Guard Academy, “Why We Need Government
Surveillance”, Center for National Policy, http://cnponline.org/ht/d/ViewBloggerThread/i/42295
Opinion: Edward Snowden is a hero The
current threat by al Qaeda and jihadists is one that requires aggressive
intelligence collection and efforts. One has to look no further than the disruption of the New York City subway bombers (the one
being touted by DNI Clapper) or the Boston Marathon bombers to know that the war on al Qaeda is coming home to us, to
our citizens, to our students, to our streets and our subways. This 21st century war is different and
requires new ways and methods of gathering information. As technology has increased, so has our
ability to gather valuable, often actionable, intelligence. However, the move toward "home-grown"
terror will necessarily require, by accident or purposefully, collections of U.S. citizens conversations
with potential overseas persons of interest. Where is NSA leaker Edward Snowden? What could authorities do with
Snowden? Snowden's path to top secret clearance Where is Edward Snowden? An open society, such as the United States, ironically
needs to use this technology to protect itself. This truth is naturally uncomfortable for a country with
a Constitution that prevents the federal government from conducting "unreasonable searches and
seizures." American historical resistance towards such activities is a bedrock of our laws, policies and
police procedures. But what might have been reasonable 10 years ago is not the same any longer. The
constant armed struggle against the jihadists has adjusted our beliefs on what we think our government can, and must, do in order to protect
its citizens. However, when we hear of programs such PRISM, or the Department of Justice getting phone records of scores of citizens without
any signs of suspicious activities nor indications of probable cause that they might be involved in terrorist related activities, the American
demand for privacy naturally emerges to challenge such "trolling" measures or data-mining. The
executive branch, although
particularly powerful in this arena, must ensure the Congress is kept abreast of activities such as these
surveillance programs. The need for enhanced intelligence activities is a necessary part of the war on
al Qaeda, but abuse can occur without ensuring the legislative branch has awareness of aggressive tactics such as these. Our Founding
Fathers, aware of the need to have an energetic, vibrant executive branch in foreign affairs, still anticipated checks upon the presidency by the
legislature. Working
together, the two branches can ensure that both legally, and by policy, this is what
the citizens desire of their government -- and that leaks such as Snowden's won't have the impact and damage that his leaks are
likely to cause.
Terrorists Use the Internet to Plan Attacks (1/2)
Terrorists use the internet to plan attacks
Thomas, Timothy L. Lieutenant Colonel of U.S. Army. 2003. Al Qaeda and the Internet:¶ The Danger¶ of
“Cyberplanning”. http://www.dtic.mil/dtic/tr/fulltext/u2/a485810.pdf. Date Accessed: 7/16/13
We can say with some certainty, al Qaeda loves the Internet. When the latter¶ first appeared, it was hailed as an
integrator of cultures and a medium for¶ businesses, consumers, and governments to communicate with one another. It¶ appeared to offer
unparalleled opportunities for the creation of a “global village.” Today the
Internet still offers that promise, but it also has proven in
some¶ respects to be a digital menace. Its use by al Qaeda is only one example. It also has¶ provided a
virtual battlefield for peacetime hostilities between Taiwan and¶ China, Israel and Palestine, Pakistan
and India, and China and the United States¶ (during both the war over Kosovo and in the aftermath of the collision between¶
the Navy EP-3 aircraft and Chinese MiG). In times of actual conflict, the Internet¶ was used as a virtual battleground between NATO’s coalition
forces and elements of the Serbian population. These real tensions from a virtual interface involved not only nation-states but also non-state
individuals and groups either¶ aligned with one side or the other, or acting independently. Evidence strongly suggests that terrorists
used
the Internet to plan their¶ operations for 9/11. Computers seized in Afghanistan reportedly revealed
that¶ al Qaeda was collecting intelligence on targets and sending encrypted messages¶ via the
Internet. As recently as 16 September 2002, al Qaeda cells operating in¶ America reportedly were
using Internet-based phone services to communicate¶ with cells overseas. These incidents indicate
that the Internet is being used as a¶ “cyberplanning” tool for terrorists. It provides terrorists with
anonymity, command and control resources, and a host of other measures to coordinate and
integrate attack options.
Terrorists have access to our digital data
Thomas, Timothy L. 2003. Lieutenant Colonel of U.S. Army. Al Qaeda and the Internet:¶ The Danger¶
of “Cyberplanning”. http://www.dtic.mil/dtic/tr/fulltext/u2/a485810.pdf. Date Accessed: 7/16/13
The Internet is used to gather information on potential targets. The¶ website operated by the Muslim
Hackers Club reportedly featured links to US¶ sites that purport to disclose sensitive information like
code names and radio frequencies used by the US Secret Service. The same website offers tutorials in
viruses, hacking stratagems, network “phreaking” and secret codes, as well as links¶ to other militant
Islamic and cyberprankster web addresses.17Recent targets that¶ terrorists have discussed include the Centers for Disease
Control and Prevention¶ in Atlanta; FedWire, the money-movement clearing system maintained by the¶ Federal Reserve Board; and facilities
controlling the flow of information over¶ the Internet.18Attacks on critical infrastructure control systems would be particularly harmful,
especially on a system such as the Supervisory Control and Data¶ Acquisition (SCADA) system. Thus any information on insecure network
architectures or non-enforceable security protocols is potentially very damaging.¶ Terrorists
have access, like many
Americans, to imaging data on potential targets, as well as maps, diagrams, and other crucial data on
important facilities or networks. Imaging data can also allow terrorists to view counterterrorist ¶
activities at a target site. One captured al Qaeda computer contained engineering¶ and structural architecture features of a dam,
enabling al Qaeda engineers and¶ planners to simulate catastrophic failures.19
Terrorists Use the Internet to Plan Attacks (2/2)
Terrorist groups can use the internet to infiltrate vital US networks and explore their
flaws.
Thomas, Timothy L. Lieutenant Colonel of U.S. Army. 2003. Al Qaeda and the Internet:¶ The Danger¶
of “Cyberplanning”. http://www.dtic.mil/dtic/tr/fulltext/u2/a485810.pdf. Date Accessed: 7/16/13
The Internet can be used to divert attention from a real attack scenario. Al Qaeda can plant threats on
the Internet or via cell phones to mislead law¶ enforcement officials. Terrorists study how the United
States collects and analyzes information, and thus how we respond to information.¶ Terrorists know
when their Internet “chatter” or use of telecommunications increases, US officials issue warnings.
Terrorists can thus introduce false¶ information into a net via routine means, measure the response it
garners from the¶ US intelligence community, and then try to figure out where the leaks are in their ¶
systems or what type of technology the United States is using to uncover their¶ plans. For example, if
terrorists use encrypted messages over cell phones to discuss a fake operation against, say, the Golden Gate Bridge, they can then sit back¶ and
watch to see if law enforcement agencies issue warnings regarding that particular landmark. If they do, then the terrorists know their
communications are¶ being listened to by US officials.3
Terrorist Attack Coming
Terrorist attack against the United States is imminent
Jenkins, Brian Michael. senior adviser to the RAND president. July 10, 2013. Could Terrorists Pull Off a
Mumbai-Style Attack in the U.S.? http://www.usnews.com/opinion/blogs/worldreport/2013/07/10/could-terrorists-launch-a-mumbai-style-attack-in-the-united-states. Date Accessed
7/17/13.
The event provided the latest evidence that the means of an armed terrorist attack are certainly
available in the United States. We've seen it over and over again, in Newtown, Connecticut; Aurora, Colorado; on the campus of
Virginia Tech, to name just a few.¶ Although these killings involved a single shooter without a terror agenda,
they demonstrate that one person, with little or no training, can acquire and effectively use firearms
to achieve high body counts. A review of the most deadly mass killings in the United States, going back
to the Columbine High School murders in 1999, show that an average of 15 people died per attack.
That's close to what each of the trained terrorist teams achieved in Mumbai.¶ [Read the U.S. News Debate:
Should People Be Allowed to Carry Guns Openly?]¶ But acquiring the firepower needed to carry out a mass murder is only one part of the
equation. An armed terrorist attack along the lines of that carried out in Mumbai presents a series of logistical challenges, starting with
recruiting and training a willing and able suicide assault force.¶ In Mumbai, there were 10 terrorists, armed with assault rifles, pistols, grenades
and improvised explosives. They carried out coordinated attacks across the city, paralyzing a metropolis of 14 million people for 60 hours while
mesmerizing the world's media. It was a complex operation and likely the culmination of months of training.¶ There are two ways a Mumbaistyle attack could be carried out in the United States. Terrorist
planners could assemble and train a team of attackers
abroad and attempt to infiltrate them into the United States, or homegrown terrorists could assemble
and launch a Mumbai-style attack. So far, neither has happened in the modern history of terrorism in the United States.¶ Bringing
a team of trained terrorists into the United States would be extremely difficult today, an audacious endeavor even by al-Qaida standards.
Improved intelligence worldwide has degraded the operational capabilities of al-Qaida and has made its operating environment more hostile.
And any large mobilization of terrorist personnel would likely be noticed by intelligence gatherers.
Cyber Terror
Cyber Attack Impact: US Retaliation
Security Leader Says U.S. Would Retaliate Against Cyberattacks
Mark Mazzetti and David E. Sanger.(Authors of New York Times.)"Security Leader Says U.S. Would
RetaliateAgainstCyberattacks."March12,2013.NewYorkTimes.http://www.nytimes.com/2013/03/13/us/
intelligence-official-warns-congress-that-cyberattacks-pose-threat-to-us.html?pagewanted=all&_r=0
The chief of the military’s newly created Cyber Command told Congress on Tuesday that he is
establishing 13 teams of programmers and computer experts who could carry out offensive
cyberattacks on foreign nations if the United States were hit with a major attack on its own networks ,
the first time the Obama administration has publicly admitted to developing such weapons for use in wartime.¶ “I would like to be clear that
this team, this defend-the-nation team, is not a defensive team,” Gen. Keith Alexander, who runs both the National Security Agency and the
new Cyber Command, told the House Armed Services Committee. “This
is an offensive team that the Defense
Department would use to defend the nation if it were attacked in cyberspace. Thirteen of the teams
that we’re creating are for that mission alone.”¶ General Alexander’s testimony came on the same day the nation’s top
intelligence official, James R. Clapper Jr., warned Congress that a major cyberattack on the United States
could cripple the country’s infrastructure and economy, and suggested that such attacks now pose the
most dangerous immediate threat to the United States, even more pressing than an attack by global
terrorist networks.¶
Cyber Attack Impact: Infrastructure
Cyber attack could shut down the US for weeks, us infrastructure relies on data run
systems
Llewellyn King,executive producer and host of "White House Chronicle", 6/10/12, The Devastating Effects of a Cyber-Attack Against a
Country's Energy Grid, http://oilprice.com/Energy/Energy-General/The-Devastating-Effects-of-a-Cyberattack-Against-a-Countries-EnergyGrid.html, date of access- 7/21/13
Computer war has grown up. It has moved from the age of the equivalent of black powder to the
equivalent of high-explosive shells -- not yet nuclear devices but close.¶ Enemies with sophisticated computer
technology, money and determination can now contemplate the possibility of taking down the
electrical systems of large swaths of the nation. Just a small interruption in power supply is
devastating; as has been demonstrated by the recent power outages in 10 states, caused by severe
weather.¶ The world as we know it stops when power fails; gasoline cannot be pumped, air
conditioning and all other household appliances cannot be used, plunging us into a dark age without
the tools of a dark age – candles, firewood, horses and carts.¶ At the center of this vulnerability is a device most
of us have never heard of but is an essential part of modern infrastructure. It is the programmable
logic controller (PLC).¶ In appearance the PLC is usually a small, black box about the size of a woman's purse. It came on the scene
in the 1960s, when microprocessors became available and has grown exponentially in application and
deployment ever since. The full computerization of the PLC put it silently but vitally in charge of nearly
every commercial/industrial operation, from assembly lines to power dispatch.¶ These devices are the
brain box of everything from air traffic systems to railroads. They replaced old-fashioned relays and
human commands, and made automation truly automatic.¶ The revolution brought on by the PLC is an “ultra-important part” of the
continuing story of technological progress, according to Ken Ball, an engineering physicist who has written a history of these devices.¶ Now
the PLC -- this quiet workhorse, this silent servant -- is a cause of worry; not so much from computer hackers, out
for a bit of fun through manipulating a single controller, but from the wreckage that can be achieved
in a government-sponsored cyberattack with planning and malice aforethought.¶ Such an attack could be
launched for diverse purposes against many aspects of our society. But the most paralyzing would be an attack on the
electrical system; on the controllers that run power plant operations and the grid, from coal to nuclear
to natural gas to wind turbines and other renewables.¶ Such a coordinated attack could bring the
United States to its knees for days or weeks with traffic jams, abandoned cars, closed airports and
hospitals reliant on emergency generators while fuel supplies last.¶
Cyber attack devastating, it would take out important infrastructure necessary to
prevent deaths.
FRANCIS, DAVID. Staff analyst for the fiscal times,3/11/13, The Coming Cyber Attack That Could Ruin Your Life, The fiscal times,
http://www.thefiscaltimes.com/Articles/2013/03/11/The-Coming-Cyber-Attack-that-Could-Ruin-Your-Life.aspx#page1, date access- 7/21/13
Last month, a private security
firm announced that Chinese military hackers had launched attacks on the
U.S. government and private companies nearly 147 times in the last seven years, a formal declaration
of a secret cyber war that’s been going on for decades.¶ This war has not yet had a major impact on the lives of average
American citizens: Attacks have resulted in minor service disruptions only, such as not being able to log into online accounts. ¶ But experts
warn these kinds of service breaks are just a small symptom of the serious damage cyber terrorists
and hackers can cause. Officials have said that hackers could cause a cyber 9/11 – an attack could
cause widespread turmoil, including the disappearance of money, electrical failure, and even death.
And America could be the battlefield in which these new techniques of war are tested. ¶ “An adversary
looking to cause chaos could pick any part of critical infrastructure, from banking to power to health
care,” said Jeffrey Carr, chief executive officer of Taia Global, a cyber security firm. “All of those are
vulnerable to cyber attack.” ¶ The most harmful cyber attacks have the ability to impact nearly every
part of American life, putting lives and essential privacy at risk. Without increased vigilance, experts say it’s only a matter of time
before a worst-case scenario becomes a reality. ¶ Hackers have attempted to infiltrate critical infrastructure components like mass transit and
power grids, although few Americans are aware of it. Former
Defense Secretary Leon Panetta says they have had
limited success. But all it takes it one breach to cause chaos.¶ “We know of specific instances where
intruders have successfully gained access to these [critical infrastructure] systems," Panetta said last October
in New York. "We also know that they are seeking to create advanced tools to attack these systems and
cause panic and destruction and even the loss of life. Ӧ Attacks like the one Panetta described could
turn off the power to large parts of the country. Public transportation systems could malfunction and
operators to lose control of systems that prevent crashes. Attackers could also take down
communication systems and Internet access.¶ According to Tom Kellermann, vice president of cyber
security for Trend Micro, attacks on infrastructure could also provide false information to people
making life and death decisions. For instance, hackers could target air traffic control systems,
providing false information that could cause planes to crash. “Everyone implicitly trusts his or her
computer,” he said. “A cyber attack can corrupt this information.”¶ So far, cyber attacks have had limited access to
bank accounts for short periods of time, and some personal information has been stolen. But according to Larry Ponemon, founder of the
Ponemon Institute, a think tank that studies data privacy, hackers want to do more than disrupt: they want to make money disappear. ¶ “In
a
successful attack against a bank, credentials and passwords are gone,” he said. “Hackers are trying to
go into accounts to steal large sums of money.” Maybe, but imagine, for example, that cyber thieves
were able to steal just 1 percent or less from JP Morgan’s $2 trillion in assets. ¶ Health care systems are
also vulnerable to these kinds of attacks. Many doctors and hospitals are now keeping electronic
medical records. Hackers can get access to this information, making changes that could potentially
lead to deadly instances where doctors prescribe unnecessary drugs or order irrelevant procedures for
the patient. ¶ “I have never seen an industry with more gaping security holes,” Avi Rubin, a computer scientist
and technical director of the Information Security Institute at Johns Hopkins University, told the Washington Post last year. “If our financial
industry regarded security the way the health-care sector does, I would stuff my cash in a mattress under my bed."¶ According to Ponemon,
hackers can target individuals without the person ever knowing it. “An
attack could be occurring if you computer is
running weird and slow,” he said. “Often times, hackers will attack computers at time when the user
is most likely sleeping.” When the system is shut down, of course, hackers can’t get in. Once a system has been infiltrated, there’s no
limit to what hackers can steal.¶ “Hackers have the ability to capture info from your devices. They can steal your password, your documents and
your spreadsheets,” Ponemon said. “You can buy dozens of antivirus programs that usually stop most of the bad stuff out there. But there are
always some malware programs that have no signature and can bypass security.” Equally troubling is the hacker’s ability to conduct surveillance
on a victim, Ponemon said.¶ “They turn on and off your camera,” Ponemon said, referring to the Web cameras that are standard in today’s
computers. “They can hack into the voice part of your phone and wiretap a real conversation or use your phone to listen in on real-time
conversations.”¶ Or as Taia Global’s Carr said, “I don’t think there is a limit on the imagination on how much harm could be done.”
Cyber attack could devastate us- defense secretary agrees. Tapping into infrastructure
would shut down the US and lead to mass death.
ELISABETH BUMILLER, staff analyst, 10/11/12, Panetta Warns of Dire Threat of Cyberattack on U.S., New York times,
http://www.nytimes.com/2012/10/12/world/panetta-warns-of-dire-threat-of-cyberattack.html?pagewanted=all&_r=0, date access- 7/21/13
Defense Secretary Leon E. Panetta warned Thursday that the United States was facing the possibility
of a “cyber-Pearl Harbor” and was increasingly vulnerable to foreign computer hackers who could
dismantle the nation’s power grid, transportation system, financial networks and government. In a
speech at the Intrepid Sea, Air and Space Museum in New York, Mr. Panetta painted a dire picture of how such an attack
on the United States might unfold. He said he was reacting to increasing aggressiveness and
technological advances by the nation’s adversaries, which officials identified as China, Russia, Iran and
militant groups. ¶ “An aggressor nation or extremist group could use these kinds of cyber tools to gain
control of critical switches,” Mr. Panetta said. “They could derail passenger trains, or even more
dangerous, derail passenger trains loaded with lethal chemicals. They could contaminate the water
supply in major cities, or shut down the power grid across large parts of the country.” ¶ Defense
officials insisted that Mr. Panetta’s words were not hyperbole, and that he was responding to a recent
wave of cyberattacks on large American financial institutions. He also cited an attack in August on the
state oil company Saudi Aramco, which infected and made useless more than 30,000 computers. ¶ But
Pentagon officials acknowledged that Mr. Panetta was also pushing for legislation on Capitol Hill. It would require new standards
at critical private-sector infrastructure facilities — like power plants, water treatment facilities and gas
pipelines — where a computer breach could cause significant casualties or economic damage. ¶ In August,
a cybersecurity bill that had been one of the administration’s national security priorities was blocked
by a group of Republicans, led by Senator John McCain of Arizona, who took the side of the U.S.
Chamber of Commerce and said it would be too burdensome for corporations. ¶ The most destructive
possibilities, Mr. Panetta said, involve “cyber-actors launching several attacks on our critical
infrastructure at one time, in combination with a physical attack.” He described the collective result as
a “cyber-Pearl Harbor that would cause physical destruction and the loss of life, an attack that would
paralyze and shock the nation and create a profound new sense of vulnerability.” ¶ Mr. Panetta also
argued against the idea that new legislation would be costly for business. “The fact is that to fully
provide the necessary protection in our democracy, cybersecurity must be passed by the Congress,”
he told his audience, Business Executives for National Security. “Without it, we are and we will be
vulnerable.” ¶ With the legislation stalled, Mr. Panetta said President Obama was weighing the option
of issuing an executive order that would promote information sharing on cybersecurity between
government and private industry. But Mr. Panetta made clear that he saw it as a stopgap measure
and that private companies, which are typically reluctant to share internal information with the
government, would cooperate fully only if required to by law. ¶ “We’re not interested in looking at e-mail, we’re not
interested in looking at information in computers, I’m not interested in violating rights or liberties of people,” Mr. Panetta told editors and
reporters at The New York Times earlier on Thursday. “But if there is a code, if there’s a worm that’s being inserted, we need to know when
that’s happening.” ¶
Hackers
Hackers Destroy Privacy
Lack of cyber security turns digital privacy- hackers can steal your private information
otherwise.
Steve Largent and Rick Boucher, congressmen, “Good cybersecurity means better privacy – opinion”
March 2013, DoA: 7/17/13 http://money.cnn.com/2013/03/05/technology/security/cybersecurityprivacy/index.html
Such views are nonsense. Quite simply, digital
privacy cannot exist without cybersecurity. Weak security equals
weak privacy. Want better privacy? Raise your security game to prevent hackers from stealing private
data. Let the experts from the private sector and government communicate with each other so when
they see threats, they can alert others and work together to create a solution.¶ Despite this common-sense
connection, a seemingly never-ending debate drags on about how our nation can improve its cybersecurity. There is lots of talk, but little action
to support privacy's enabler.¶ That could change if Congress passes The Cyber Intelligence Sharing and Protection Act (CISPA) and the President
signs it into law. CISPA passed the House (248-168) about a year ago, and since then has been the subject of considerable discussion, with no
discernible progress.¶ Critics don't like the fact that CISPA enables information sharing between the federal government and the private sector
in order to prevent cyberattacks and to pursue cybercriminals, hackers, fraudsters and others intent on harm. As they see it, such cooperation
constitutes a potential privacy invasion that is so egregious as to merit no further consideration.¶ Their concerns are, no doubt, well intended.
But they are also out of touch with reality and risk unintended consequences that only serve to allow cybercriminals to operate with impunity.¶
The breadth and scale of the threat of cyberattacks on our
nation's critical infrastructure -- financial institutions, electric and water utilities and air traffic control
systems, to name just a few -- to say nothing of consumers' personal data, is no longer in debate.
Meanwhile, the avenues and opportunities by which hackers have to penetrate our networks are
growing hand in hand with our increasingly mobile communications ecosystem. On the consumer
side, for example, a recent study concludes more than 40% of U.S. smartphone users will click on
unsafe links this year, potentially spreading malware that can steal data and dollars to their friends, family and colleagues.¶
Related story: Wake up, America! China is attacking¶
Hackers destroy Digital Privacy and violate Constitutional liberties.
Rogers, Mike, Member of the House of Representatives and Chairman of the Permanent Select
Committee on Intelligence. Ruppersburg, Dutch, also a member of the House of Reps, andn a ranking
member on Permanent Select Committee on Intelligence. 4/16/13 Protecting Internet freedom is a
priority http://thehill.com/special-reports/defense-and-cybersecurity-april-2013/294319-protectinginternet-freedom-is-a-priority Date Accessed; 7/20/13
The privacy and civil liberties rights enshrined in the Constitution that we swore to protect are
threatened daily as foreign hackers steal unfathomable amounts of information from our computer
networks. These networks contain our most important personal information, including our banking,
medical and family records. Secure computer networks are vital to ensuring that the Internet remains
a key and open forum for individual expression — America simply cannot turn a blind eye to this
threat any longer.
Prism
Prism is necessary to search for terrorists
Schmitt, Eric, Sanger, David E., Savage, Charlie. June 7, 2013. Administration Says Mining of Data Is
Crucial to Fight Terror. http://www.nytimes.com/2013/06/08/us/mining-of-data-is-called-crucial-tofight-terror.html?pagewanted=all. Date Accessed: 7/16/13.
[Obama] argued that “modest encroachments on privacy” — including keeping records of phone numbers called and
the length of calls that can be used to track terrorists, though not listening in to calls — were “worth us doing”
to protect the country. The programs, he said, were authorized by Congress and regularly reviewed by federal courts. ¶ But privacy
advocates questioned the portrayal of the program’s intrusion on Americans’ communications as modest. When Americans
communicate with a targeted person overseas, the program can vacuum up and store for later
searching — without a warrant — their calls and e-mails, too. ¶ Mr. Obama acknowledged that he had hesitations
when he inherited the program from George W. Bush, but told reporters that he soon became convinced of its necessity. “You can’t have 100
percent security and also then have 100 percent privacy and zero inconvenience,” he said. “We’re going to have to make some choices as a
society.” ¶ To defenders of the N.S.A., the Zazi case underscores how the agency’s Internet surveillance system, called
Prism, which
was set up over the past decade to collect data from online providers of e-mail and chat services, has
yielded concrete results. ¶ “We were able to glean critical information,” said a senior intelligence official, who spoke
on the condition of anonymity. “It was through an e-mail correspondence that we had access to only through Prism.” ¶ John Miller, a former
senior intelligence official who now works for CBS News, said on “CBS This Morning,” “That’s how a program like this is supposed to work.” ¶
Veterans of the Obama intelligence agencies say the large collections of digital data are vital in the
search for terrorists. “If you’re looking for a needle in the haystack, you need a haystack,” Jeremy Bash, chief of staff to Leon E. Panetta,
the former C.I.A. director and defense secretary, said on MSNBC on Friday.¶ Under the program, intelligence officials must
present Internet companies with specific requests for information on a case-by-case basis, showing
that the target is a foreigner and located outside the United States, a senior law enforcement official
said Friday. If the N.S.A. comes across information about an American citizen during the search, it
turns over that material to the F.B.I. for an assessment, the official said.
Obama argues there are limits to the surveillance allowed under Prism.
Hennessey, Kathleen. June 19, 2013. Obama defends NSA digital surveillance programs.
http://www.latimes.com/news/world/worldnow/la-fg-wn-obama-defends-nsa-surveillance20130619,0,3630725.story. Date Accessed 7/17/13.
BERLIN -- President Obama tried to reassure skeptical Europeans about sweeping U.S. digital surveillance
programs expanded under his watch, arguing that the programs are circumscribed, overseen by a court and
effective.¶ "What I can say to everybody in Germany and everybody around the world is this applies very narrowly," Obama said
Wednesday after a meeting in which German Chancellor Angela Merkel pressed the president on whether the programs were violating the
privacy rights of German citizens.¶ "This
is not a situation in which we are rifling through the ordinary emails of
is not a situation where we can go
on to the Internet and start searching any way we want."¶ Obama argued that the collection of bulk data on phone
German citizens or American citizens or French citizens or anybody else," he said. "This
records and Internet activity has averted "at least 50 threats," repeating claims made by other administration officials since details about the
programs were disclosed two weeks ago.
Patriot Act and surveillance of citizens enables NSA to thwart dozens of terrorist
attacks
Cohen, Tom, Staff writer cnn, 6/13/13, CNN, NSA director: Data mining follows law, thwarts terror,
http://www.cnn.com/2013/06/12/politics/nsa-terror-hearing, Date Accessed: 7/17/13
Phone records obtained by the government through a secret surveillance program disclosed last week
helped to prevent "dozens" of terrorist acts, the director of the National Security Agency told a Senate hearing on
Wednesday.¶ Army Gen. Keith Alexander provided the most detailed account so far from a government official of the program in which the
agency collects phone records that then can be accessed under federal court permission to investigate suspected terrorists.¶
The scope of
the secret program – potentially [involved] involving phone records of every American -- set off a political
firestorm when details emerged with publication of a leaked document.¶ Further leaks revealed other secret programs that collect computer
activity and other information.¶ Critics on the right and left accused the government of going well beyond the intended reach of the Patriot Act
enacted after the September 11, 2001, terrorist attacks on the United States.¶
Questioned by senators from both parties at
a hearing on broader cybersecurity issues, Alexander provided a spirited defense for the programs he
described as critical to counter-terrorism efforts.¶ "I think what we're doing to protect American
citizens here is the right thing," he said. "Our agency takes great pride in protecting this nation and our civil liberties and
privacy, and doing it in partnership with this committee, with this Congress, and with the courts."¶ Alexander added that he welcomed a public
debate over protecting America while preserving civil liberties.¶ "To date, we've not been able to explain it because it's classified, so that issue
is something that we're wrestling with," he said. "... This
isn't something that's just NSA or the administration doing
that and so on. This is what ... our nation expects our government to do for us. So, we ought to have that
debate. We ought to put it out there."¶ In the end, he said, some aspects of the giant surveillance apparatus created after 9/11 would have to
remain classified.¶ "And they should be, because if we tell the terrorists every way that we are going to track them, they will get through and
Americans will die," he said.¶ Alexander also rejected the claim that former NSA contractor Edward Snowden, who admitted leaking the topsecret documents on electronic surveillance programs and is now in hiding, could tap into any American's phone or e-mail.¶ "I know of no way
to do that," he said, calling Snowden's statement "false."¶ In an exchange with Democratic
Sen. Patrick Leahy of Vermont,
Alexander said he believed the program under Section 215 of the Patriot Act was "critical" in helping
the intelligence community corroborate information on possible threats.¶ "It is dozens of terrorist
events that these have helped prevent," Alexander said of the Section 215 program and another that collects
information on foreign computer use.¶ He would not discuss specific disrupted plots, saying they were classified, but he told Leahy that the
two programs together played a role in helping to stop a planned attack on the New York subway
system.¶ Information developed overseas was passed along to the FBI, which was able to identify suspect
Najibullah Zazi in Colorado and ultimately uncover a plot, he said. Zazi pleaded guilty to terror-related charges in
2010.¶ In response to questions from senators about why the Section 215 program needed to collect
billions of U.S. phone records, Alexander explained that the agency held the records for five years in
the event that an investigation uncovered an overseas terrorist link to a specific area in the United
States.¶ With a database of phone records, the agency can go "back in time" to figure out the number and date that a suspect called, he
said.¶ "We won't search that unless we have some reasonable, articulable suspicion about a terroristrelated organization," Alexander said.¶ Once permission is granted, "we can now look and say, 'who was
this guy talking to in the United States and why?'"¶ "The system just gives us back who he was talking
to," Alexander explained. "But if you didn't collect it, how do you know who he was talking to?"¶
Obtaining further information, such as the content of the call, would require a court order, he said.¶ GOP
Sen. Mike Johanns of Nebraska pressed Alexander on the issue, asking if the search could span "the breadth of telephone records."¶ "The
American public is fearful that in this massive amount of data you get that there's the ability of the federal government to synthesize that data
and learn something more than maybe what was ever contemplated by the Patriot Act," Johanns said.¶ Alexander will return to the panel on
Thursday to give a classified briefing on the programs in order to provide more information, and he pledged to work with the committee to
come up with more detailed explanations for the American public.¶ He explained his caution on Wednesday by saying revelations such as the
classified documents about the secret programs were harmful to national security efforts.¶ "I would rather take a public beating and people
think I am hiding something than to jeopardize the security of this country," Alexander said.¶
Espionage
Espionage-Russia
Russian-US Cold War Espionage still a threat
Ross, Brian (Staff Writer ABC News) Jun 2013 Edward Snowden Steps Into Secret U.S.-Russia Spy
Scuffle http://abcnews.go.com/Blotter/edward-snowden-steps-secret-us-russia-spyscuffle/story?id=19495341#.UeViQPlQFZ4 Date Accessed: 7/16/13
An ABC News review of public reports shows that in the past 16 months alone, at least six people have
been accused or convicted of spying for the U.S. in Russia, including two Americans who were kicked out of the country
and four Russians purportedly recruited by U.S. intelligence -- all sent to prison. Another American, a lawyer, was reportedly
expelled from Russia this May because he rebuffed Russian agents' attempt to recruit him to spy for
them.¶ "Espionage is alive and well" between the old Cold War foes, said David Major, a former senior
FBI counter-intelligence officer and now President of the Centre for Counterintelligence and Security
Studies, which tracks spy cases the world over.¶ Some of the cases, like that of blown CIA agent Ryan Fogle, splashed across headlines the
world over. But several others, like the case of a Russian intelligence colonel who worked with the CIA and got 18 years behind bars for it,
barely made a ripple in American media.¶ Prior to 2012,
the whole world took notice in 2010 when the FBI rounded
up 10 undercover Russian agents in America – including the "SoHo Spy" Anna Chapman – but far fewer heard in 2011 when it
was revealed a Russian intelligence official in Moscow had given the spy ring up and then fled to the U.S. That man, Col. Alexander Poteyev,
reportedly had been recruited by the CIA.¶ Now
with Snowden, a former contractor for the National Security
Agency with a head and, reportedly, laptops full of U.S. secrets, Major said the Russians have been
handed a victory, even if Snowden insists he's not working with any governments.¶ "One of the highest
targets [for foreign intelligence agencies] has always been the NSA, one of the hardest targets for them ever to
penetrate," Major said. "[Russian intelligence] is going to look at this case as an opportunity, as a treasure
trove of intelligence that [will be] exploited to the extent that they can, and then when they decide, they'll move
on."
Espionage is a difficult to manage, yet growing problem to the U.S
Lewis, James A(Director of Technology at CSIS) December 2002 Assessing the Risks of Cyber
Terrorism, Cyber War and Other Cyber Threatshttp://www.steptoe.com/publications/231a.pdf Date
Accessed: 7/16/2013
Espionage opportunities created by a greater reliance on internet-accessible computer ¶ networks will
create greater risk for national security than cyber attacks. Terrorist groups ¶ are likely to use the
Internet to collect information on potential targets, and intelligence¶ services can not only benefit
from information openly available on the web but,14 more¶ importantly, can benefit from the ability to
clandestinely penetrate computer networks¶ and collect information that is not publicly available. This is very
different from hacking, ¶ in that in the event of a successful penetration of a hostile network, a terrorist group or an ¶ intelligence
service will want to be as unobtrusive as possible. A sophisticated opponent ¶ might hack into a
system and sit there, collecting intelligence and working to remain ¶ unnoticed. It will not disrupt essential
services or leave embarrassing messages on ¶ websites, but remain quietly in the background collecting information. Collection ¶
techniques for the Internet differ significantly from earlier signals and communications ¶ intercept
techniques, and while different kinds of data will be collected, the overall effect ¶ may be to make
some espionage activities much more rewarding. This topic, the ¶ implications for espionage of the greater use of computer
networks and Internet ¶ protocols, deserves further study.
Espionage-China
Espionage is top threat to the US- China has been accused of espionage
Hosenball, Mark. (Investigative Producer NBC, Staff Writer on Reuters) Mar 2012 Cyber-attacks leading
threat against U.S.: Spy Agencies http://www.reuters.com/article/2013/03/12/us-usa-threatsidUSBRE92B0LS20130312 Date Accessed: 7/15/13
(Reuters) - Intelligence leaders said for the first time on Tuesday that cyber attacks and cyber espionage
have supplanted terrorism as the top security threat facing the United States. That stark assessment, in an
annual "worldwide threat" briefing that covered concerns as diverse as North Korea's belligerence and Syria's civil war, was
reinforced in remarks by the spy chiefs before the Senate Intelligence Committee. They expressed concern that computer
technology is evolving so quickly it is hard for security experts to keep up. "In some cases, the world is
applying digital technologies faster than our ability to understand the security implications and
mitigate potential risks," James Clapper, the Director of National Intelligence, told the committee. In written testimony, Clapper
softened his analysis somewhat, playing down the likelihood of catastrophic attacks on the United States in the near term - either through
digital technologies, or from foreign or domestic militants employing traditional violence. But this year's annual threat briefing underscored
how, a decade after the Iraq war began and nearly two years after the killing of al Qaeda leader Osama bin Laden, digital
assaults on
government and computer networks have supplanted earlier security fears. On Monday, White House
national security adviser Tom Donilon, citing complaints from U.S. businesses about alleged Chinese
cyber espionage, said the issue is a growing challenge to economic relations between the United
States and China.
China cyber attacks are growing and the us needs to actively search for hackers.
David Feith, an editorial page writer for The Wall Street Journal Asia in Hong Kong “Timothy L. Thomas:
Why China Is Reading Your Email” DoP: 2013 March, DoA: 7/17/13 http://stream.wsj.com/story/latestheadlines/SS-2-63399/SS-2-200781/
For several years, Washington has treated China as the Lord Voldemort of geopolitics—the foe who must
not be named, lest all economic and diplomatic hell break loose. That policy seemed to be ending in recent weeks, and
Timothy Thomas thinks it’s about time.¶ The clearest sign of change came in a March 11 speech by Tom Donilon,
President Obama’s national security adviser, who condemned “cyber intrusions emanating from China
on an unprecedented scale” and declared that “the international community cannot tolerate such activity from any country.”
Chinese cyber aggression poses risks “to international trade, to the reputation of Chinese industry and to our overall relations,” Mr. Donilon
said, and Beijing must stop it.¶ “Why did we wait so long?” wonders Mr. Thomas as we sit in the U.S. Army’s Foreign Military Studies Office,
where the 64-year-old retired lieutenant colonel has studied Chinese cyber strategy for two decades. More
than enough evidence
accumulated long ago, he says, for the U.S. to say to Beijing and its denials of responsibility, “Folks, you
don’t have a leg to stand on, sorry.” Beijing's cyber attacks are rooted in military strategy, says one of America's
foremost experts. The best way to combat them is for the U.S. to go on the cyber offensive too.
The US is developing Cyber defense teams to monitor data to protect from cyber
attacks.
Robertson Adi, Adi RobertsonWa is a reporter for The Verge.,“NSA head says 13 'offensive teams' being trained for cyberwarfare” DoP:
3/13/13, DoA: 7/16/13,¶ http://www.theverge.com/2013/3/13/4099958/nsa-head-says-13-offensive-teams-being-trained-for-cyberwarfare
As Director of National Intelligence James Clapper discussed the "remote" threat of a major
cyberattack within the next two years, NSA and US Cyber Command director Gen. Keith Alexander told Congress that the
US was training its own cyberwarriors as well. In yesterday's hearing before the House Armed Services Committee, Alexander
emphasized that "this team, this defend-the-nation team, is not a defensive team... This is an offensive team that the Defense Department
would use to defend the nation if it were attacked in cyberspace. 13 of the teams that we’re creating are for that mission alone."¶ As The New
York Times reports, Alexander says 27 additional
teams are dedicated to training and surveillance, and more will be
able to "defend our networks in cyberspace." He did not go into detail about the projects, but he said that training was the
most important task at hand, and that defense
was best served by monitoring incoming traffic to the US with
systems that could check for attacks. Current fears about cyberwarfare have focused on China, which
is considered responsible for recent attacks on The New York Times and other papers, but Clapper has said that "isolated state
or nonstate actors" are more likely to launch high-stakes campaigns that could take out critical infrastructure.¶
China Espionage Impact: Innovation
China cyber attacks on threaten innovation by top companies
McGarry, Brendan, staff analyst and writer, 5/21/13, China’s Cyber Attacks Threaten Social Order: Analyst, Defense Tech,
http://defensetech.org/2013/05/21/chinas-cyber-attacks-threaten-social-order-analyst/, date access- 7/21/13
China’s communist party that its cyber attacks against Western targets
threaten to undermine the Chinese economy and social order, an analyst said.¶ When asked what President Barack
The U.S. president should tell the leader of
Obama should say to President Xi Jinping at their next meeting in June, James Mulvenon, a vice president at Defense Group Inc., a technology
company in Vienna, Va., was blunt.¶ “This is
imperiling your own economic development, which is imperiling your
social stability, which is your No. 1 priority,” Mulvenon said May 21 during a panel discussion at the Center for Strategic and International
Studies, a think tank in Washington, D.C. “The only message that will get through to a general secretary of the Chinese
communist party is that economic development and social stability are threatened by the brazen scope and scale of
this intrusion.”¶ China was a frequent topic of discussion during the discussion, part of an event called “Threat and Response: Combating
Advanced Attacks and Cyber-Espionage,” which drew a roomful of academics, executives, government and military officials, and reporters.¶
A
Chinese espionage group since 2006 has stolen hundreds of terabytes of information from at least 141
companies across 20 major industries, including aerospace and defense, according to a February report from
Mandiant, a closely held company based in Alexandria, Va., which sells information-security services.¶ Obama should tell Xi that such actions
“are undermining that last remaining pillar of strategic cooperative Sino-U.S. relations,” Mulvenon said. “The
trade and business
community are some of the loudest critics of what’s going on the Chinese side who traditionally have
been the strongest proponents of cooperative Sino-U.S. relations.”¶ Mulvenon also criticized China’s official response
to the report.¶ “The Chinese, in my view, have always been terrible strategic communicators but they
reached a new low recently when their response to the Mandiant report was — and this is an official
spokesman at the Ministry of National Defense said — there is no Unit 61398,” he said. “We have hundreds of pieces of
open-source data identifying that unit is public knowledge,” he added. “Their literally response at the official level is to deny reality.”¶ U.S.
companies are already being hurt by the theft of intellectual property, according to Shawn Henry, president of
CrowdStrike Services, a security technology firm based in San Francisco, and former executive assistant director of the Federal Bureau of
Investigation.
A biotechnology company that typically takes five years to take an idea to market has
noticed Chinese competitors churning out similar products in 18 months, Henry said.¶ “It’s not because they’ve
come up with some newfangled manufacturing process,” he said during the panel. It’s because concept and engineering
resources are “being stolen, and they’re going right from manufacturing and to market.”¶ Chief executive
officers must be responsible for the security of their companies’ networks, according to Chris Inglis, deputy director of the National Security
Agency, the Pentagon’s code-breaking wing.¶ “We need to hold CEOs or the appropriate parties accountable for the resilience, the security,
integrity of those things that generate revenue or generate whatever the business is of that particular organization,” he said in separate
remarks at the event.¶ Similar to the way they pay attention to finances under Sarbanes-Oxley, the 2002 legislation designed to protect
investors from fraudulent accounting practices, executives may “spend an equal amount of time to the integrity and the resilience of their
networks because it’s not just a commodity whose fate may have an effect on their bottom line, it’s a foundation for their business,” Inglis
said.¶ A bill sponsored by Rep. Mike Rogers, R-Mich., chairman of the House Intelligence Committee, would make it easier for intelligence
agencies to share information with the private sector. The legislation, Cyber Intelligence Sharing and Protection Act, H.R. 624, has been referred
to the Senate Intelligence Committee.¶ The U.S. Defense Department in a report released May 5 for the first time blamed China directly for
targeting its computer networks. The attacks
were focused on extracting information, including sensitive defense
technology.¶ “In 2012, numerous computer systems around the world, including those owned by the
U.S. government, continued to be targeted for intrusions, some of which appear to be attributable
directly to the Chinese government and military,” it states. “The accesses and skills required for these
intrusions are similar to those necessary to conduct computer network attacks.Ӧ China called the accusations
“groundless” and “not in line with the efforts made by both sides to strengthen mutual trust and cooperation,” according to a May 9 article
published on the state-run website, “People’s Daily Online.” The country is a “victim itself of cyberattacks,” it states.¶ The
U.S. faces a
dilemma in talks with China because the U.S. has tried to make a distinction between types of spying
in cyberspace, including traditional espionage, which it says cannot be legislated or governed through
treaty, and commercial espionage, which it says can, Mulvenon said.¶ “This has been a real clangor with the Chinese because they
don’t see the distinction because in their system the same people are doing both,” he said. China has single, large-scale, state-owned
companies in each sector of the economy, making it easy for government spies to pass intelligence to corporate executives, he said.¶ “They
don’t believe us when we tell them we are statutorily precluded from doing commercial espionage and we even give them a very practical
reason: We say if the United States conducted commercial espionage on behalf of its companies, we wouldn’t know how to share the proceeds
without somebody who didn’t get it suing us in the U.S. government for anti-trust violations,” Mulvenon said.¶ Russia is much stealthier than
China when it comes to cyberspace espionage, Mulvenon said. “They use a lot more crypto,” he said, referring to cryptography.
China Espionage Impact-Media
The Chinese Govermennt is hacking into American computers to try to intimidate the
media.
Rogers, Mike, Member of the House of Representatives and Chairman of the Permanent Select
Committee on Intelligence. Ruppersburg, Dutch, also a member of the House of Reps, andn a ranking
member on Permanent Select Committee on Intelligence. 4/16/13 Protecting Internet freedom is a
priority http://thehill.com/special-reports/defense-and-cybersecurity-april-2013/294319-protectinginternet-freedom-is-a-priority Date Accessed; 7/20/13
Most associate cybersecurity with the protection of government, utility, transportation and financial
systems. But cybersecurity is not limited to military information and energy grids. National news
organizations including The New York Times, The Wall Street Journal and The Washington Post
recently all reported that they were subject to cyberattacks. The recent cyberattacks on media outlets
were an attempt to intimidate and harass newspapers that dared publish information critical of the
Chinese government. Cyberattackers have hacked into American think tanks that have published
papers critical of the Chinese government, in an attempt to squash any dissent. The Chinese are very
good at squashing internal political dissent, and they are now attempting to bring those threats across
the ocean to our shores.
Espionage-Iran
Iran is a serious cyber threat
J. Nicholas Hoover.Senior editor for InformationWeek Government.April 26, 2012.Congress
RaisesAlarmOnIranianCyberThreat.
InformationWeek.http://www.informationweek.com/government/security/congress-raises-alarm-oniranian-cyber-t/232901044.DateRetrieved: July 17, 2013
The Iranian cyber threat to the United States is on the rise, lawmakers and foreign policy observers warned in a House
Homeland Security Committee hearing Thursday. "There should be little doubt that a country that kills innocent
people around the world, guns down its own people, and threatens Israel would not hesitate to carry
out a cyber-attack against the U.S.," said counterterrorism and intelligence subcommittee chairman
Patrick Meehan, R-Pa., whose subcommittee held a joint hearing with the cybersecurity, infrastructure protection, and security
technologies subcommittee. Warnings about the threat of an Iranian attack came from all angles during the hearing,
but the hearing did not include participation by a single intelligence or military official. Director of National Intelligence James Clapper recently
testified to Iran's improvement in the cyber arena. Meehan
called Iran's growing cyber capabilities a "real and
genuine challenge and threat to the United States and its interests," noting the recent attack of a proIranian group called the Iranian Cyber Army on the government news agency Voice Of America. A
Meehan-penned op-ed titled "Iranian Cyber Threat Cannot Be Underestimated" appeared on the website of Congressional
news site The Hill on Thursday. Panelists called to attention recent media reports about Iranian diplomats involved in planned cyber-attacks
against nuclear power plants and other targets. The country also recently claimed that the downing of a drone inside the country was thanks to
a hack of the drone's GPS signals. "They're taking their gloves off right now in the cyber environment," said Frank Cilluffo, associate VP and
director of the Homeland Security Policy Institute and a former Bush administration homeland security official. Panelists at the session
were quick to point out that Iran does not yet pose the same level of technical threat as Russia and
China, but said that Iran's intentions help make it dangerous. "As yet, Iran has not shown itself to be a
similarly advanced or persistent threat" as Russia and China, Cilluffo said. "The bad news is that what they
lack in capability, they make up for in intent and are not as hesitant as other countries may be." Ilya
Berman, VP of the hawkish and conservative American Foreign Policy Council, agreed with Cilluffo's assessment, adding that Iran poses a
potentially significant threat in the asymmetric world of cyberspace. "Cyberspace
is a field that advantages asymmetric
actors," he said. "As a result, the capabilities are an issue, but intent is even more of an issue. Unlike in
Russian and China, where conflicts exist but at least we have diplomatic relations with those
countries, there are a number of threats on the table with Iran." Berman recommended that the
United States government create a stronger deterrence strategy against Iranian cyber-attacks. "We
have had an abject lack of a deterrent strategy in facing Iran, and [the cyber world] is crying out for a
deterrence strategy so that the Iranian regime recognizes that there are redlines that they can't cross,"
he said.
Patriot Act
Patriot Act Balances National Security and Privacy
Homeland Security says it prioritizes national security at the expense of Privacy while
preserving both – States Secret Privilege proves
Palin, Philip J, 9/18/11, Homeland Security Watch, Brennan: Counterterrorism and the Law,
http://www.hlswatch.com/index.php?s=patriot+act , Date Accessed : 7/17/11
We’ve also worked to uphold our values and the rule of law in a second area—our policies and practices
here at home. As I said, we will use all lawful tools at our disposal, and that includes authorities under
the renewed PATRIOT Act. We firmly believe that our intelligence gathering tools must enable us to
collect the information we need to protect the American people. At the same time, these tools must
be subject to appropriate oversight and rigorous checks and balances that protect the privacy of
innocent individuals.¶ As such, we have ensured that investigative techniques in the United States are
conducted in a manner that is consistent with our laws and subject to the supervision of our courts. We
have also taken administrative steps to institute additional checks and balances, above and beyond what
is required by law, in order to better safeguard the privacy rights of innocent Americans.¶ Our
democratic values also include—and our national security demands—open and transparent
government. Some information obviously needs to be protected. And since his first days in office,
President Obama has worked to strike the proper balance between the security the American people
deserve and the openness our democratic society expects.¶ In one of his first acts, the President
issued a new Executive Order on classified information that, among other things, reestablished the
principle that all classified information will ultimately be declassified. The President also issued a
Freedom of Information Act Directive mandating that agencies adopt a presumption of disclosure
when processing requests for information. The President signed into law the first intelligence
authorization act in over five years to ensure better oversight of intelligence activities. Among other
things, the legislation revised the process for reporting sensitive intelligence activities to Congress and
created an Inspector General for the Intelligence Community.¶ For the first time, President Obama
released the combined budget of the intelligence community, and reconstituted the Intelligence
Oversight Board, an important check on the government’s intelligence activities. The President
declassified and released legal memos that authorized the use, in early times, of enhanced
interrogation techniques. Understanding that the reasons to keep those memos secret had
evaporated, the President felt it was important for the American people to understand how those
methods came to be authorized and used.¶ The President, through the Attorney General, instituted a
new process to consider invocation of the so-called “state secrets privilege,” where the government
can protect information in civil lawsuits. This process ensures that this privilege is never used simply
to hide embarrassing or unlawful government activities. But, it also recognizes that its use is
absolutely necessary in certain cases for the protection of national security. I know there has been
some criticism of the Administration on this. But by applying a stricter internal review process, including
a requirement of personal approval by the Attorney General, we are working to ensure that this
extraordinary power is asserted only when there is a strong justification to do so.¶
A2-“Patriot Act Violates Liberties”
Patriot Act vital; safeguards in place to protect liberties
Sales, Nathan A. SEPTEMBER 8, 2011. A Vital Weapon. http://www.nytimes.com/roomfordebate/2011/09/07/do-we-still-need-thepatriot-act/the-patriot-act-is-a-vital-weapon-in-fighting-terrorism. Date Accessed 7/17/13.
America needs the Patriot Act because it helps prevent terrorism while posing little risk to civil
liberties. The law simply lets counterterrorism agents use tools that police officers have used for
decades. And it contains elaborate safeguards against abuse.¶ Consider the three provisions Congress renewed last
May.¶ 1. Congress authorized “roving wiretaps” back in 1986 -- court orders that allow police to monitor criminals even if they switch phones.
The Patriot Act allows the same thing in terrorism investigations. The law levels the playing field: If a roving wiretap is good enough for Tony
Soprano, it’s good enough for Mohamed Atta.¶ The
Patriot Act features strict safeguards. Agents can’t eavesdrop
unless they get a judge’s permission. They must demonstrate that the suspect is a terrorist. And they
must notify the judge when they go up on a new phone.¶ 2. Grand juries in criminal cases routinely
subpoena “business records” from companies like banks and retailers. The Patriot Act lets
counterterrorism agents get the same documents.¶ The law simply lets counterterrorism agents use
tools that police officers have used for decades.¶ The act’s protections are even stronger than the
grand jury rules. Prosecutors issue subpoenas unilaterally, but the Patriot Act requires the F.B.I. to get a judge’s approval. Americans
can’t be investigated on the basis of First Amendment activities, and special limits apply to sensitive materials like medical or library records.¶ 3.
Before 9/11, it was difficult for authorities to monitor “lone wolves” with murky ties to overseas
terrorist groups. The F.B.I. suspected that Zacarias Moussaoui was a terrorist, but agents hadn’t
connected him to Al Qaeda, so it wasn’t clear they could search his apartment. Congress fixed that
problem. Now, agents can monitor a terrorist even if they haven’t yet found evidence he belongs to a
foreign terrorist organization.¶ Again, the Patriot Act has robust safeguards. Agents have to convince a judge to
let them track a lone wolf. This tool can only be used to investigate international terrorism, not domestic. And it doesn’t apply to Americans,
only to temporary visitors like tourists.
Citizens trade off digital privacy for security to prevent terror under the patriot act
Zarka, Heater, Staff writer, 5/8/07, Yahoo, How the Patriot Act Helps United States Citizens, http://voices.yahoo.com/how-patriot-acthelps-united-states-citizens-326827.html, Date accessed: 7/17/13
Many people believe that most terrorist attacks are spontaneous and random. However, the attacks
are methodical and wellplanned. Generally, the terrorists commit numerous crimes before an attack actually occurs. For
example, they may use false student visas to obtain entry, trafficking of drugs, provide material
support to terrorist organizations, and steal weapons and explosives prior to the attack. When all this
activity is going on is when officials need to "pounce" on the terrorists.¶ The PATRIOT Act was established to "deter and
punish terrorist acts in the United States and around the world, to enhance law enforcement
investigatory tools, and for other purposes" (Bullock, Haddow, & Coppola, 2006, pg.519). And in order
to deter terrorist acts, the PATRIOT Act allows the government a variety of "tools". Some of the tools
are as follows: permits the seizure of voicemails, permits execution of a search warrant with delayed
notification (sneak and peek warrants), as well as other procedures.¶ Creates new laws regarding the
financing of terrorist organizations. Permits detention of suspected terrorists for up to seven days
without charges or without initiating deportation. Relaxes the restrictions on information sharing
between agencies. Grants access to internet and computer information. The government can check
medical records, student records, and credit records secretly and without permission. They are also
able to monitor financial activities and records (Bullock, Haddow, & Coppola, 2006). The above is a list of only a few of the
tools available for law enforcement officials concerning terrorism. Most if not all of the above list, will actually allow
officials to notice terrorist activity before an attack occurs. Some of the terrorist activities include
false visas, theft, money laundering, extortion, financial support to terrorist organizations, and selling
drugs. The terrorists commit those activities in order to support themselves, their group, and their
mission (the attack). As mentioned above a terrorist attack is well planned out. With the Patriot Act, we are able to monitor suspected terrorists
without many prior restrictions. The Patriot Act also created new legislation as well as strengthened some penalties for terrorist related crimes, so
instead of 10 years imprisonment they get 15 (example). According to Howard & Sawyer, 2006, "The radicals conclude that the United States has
strategically killed Muslims to terrorize the Islamic nation" (Sawyer, & Howard, 2006, pg.221). Therefore, Al-Qaeda justifies the killing of as
many American citizens as possible as Bin Laden declared war on the U.S. and her allies. That
means that the United States
should be granted extensive authority to monitor terrorist activity. However, as the years have passed
since 9/11 many people are in an uproar about constitutional freedoms and rights concerning the
Patriot Act. It seems like another devastating attack will have to occur on U.S. soil before they realize
the severity of terrorism.¶
CIPSA
A2: Endless Invasion of Privacy
Cyber Intelligence Sharing and Protection Act has limitations in place to place to
prevent it from invading your privacy.
Rogers, Mike, Member of the House of Representatives and Chairman of the Permanent Select
Committee on Intelligence. Ruppersburg, Dutch, also a member of the House of Reps, andn a ranking
member on Permanent Select Committee on Intelligence. 4/16/13 Protecting Internet freedom is a
priority http://thehill.com/special-reports/defense-and-cybersecurity-april-2013/294319-protectinginternet-freedom-is-a-priority Date Accessed; 7/20/13
These attackers have stolen Americans’ most personal information, including banking and health
records, which can be used for identity theft or blackmail purposes. Using sophisticated distributed denial of service
attacks, foreign cyberattackers are also shutting down websites critical to Americans’ everyday lives,
such as banking websites — compromising not only your bank account, but also the freedom of the
Internet. CISPA was drafted to protect individuals’ privacy and civil liberties while still enabling
effective cyber threat information-sharing. At the suggestion of several privacy and civil liberties groups, we made
numerous changes to the act to further narrow its scope and purpose to ensure protection of these liberties. CISPA does not
allow the federal government to read your email or your Facebook posts or monitor your Internet
activity. The definitions in the bill were narrowed on the House floor to better ensure the bill’s authorities could not be
misinterpreted or misused for broader purposes. CISPA was also amended to restrict how the government can
use the threat information shared by industry to four narrow categories: cybersecurity; investigation
and prosecution of cybersecurity crimes; protection of individuals from the danger of death or
physical injury; and protection of minors from physical or psychological harm such as child pornography.
CISPA can keep the government in check
Rogers, Mike. Ruppersburg, Dutch.(House of Representatives). 4/16/13 Protecting Internet freedom is a
priority http://thehill.com/special-reports/defense-and-cybersecurity-april-2013/294319-protectinginternet-freedom-is-a-priority Date Accessed; 7/20/13
Contrary to some assertions, CISPA does not provide any new authorities for the government to
monitor private networks. Moreover, a private company can restrict the information it shares, to
minimize or anonymize any personal information before sharing the cyber threat information. CISPA is
also designed to prevent companies from sharing information about an individual customer or
subscriber. Finally, the bill also requires an annual report from the intelligence community’s inspector
general to ensure that none of the information provided to government is mishandled or misused.
Making the Internet more secure will itself protect Americans’ privacy, civil liberties and Internet
freedoms, which are presently being whittled away with each successful foreign cyberattack.
Few of us can imagine life without the Internet. We believe this bill is necessary to protect the very
freedom and openness that created the immeasurable benefits the Internet has provided to the
world.
Wire Taps
Wiretaps Solve Terrorism
Wire Tapping has been instrumental in preventing terrorist attacks
Michael Hewitt, Liberty University, 2008, Running head: WIRETAPPING: A NECESSITY, Wiretapping: A Necessity for Effectively Combating
Terrorism in the 21st Century, http://digitalcommons.liberty.edu/cgi/viewcontent.cgi?article=1040&context=honors
In analyzing post 9-11 wiretapping, it is necessary to analyze the effects that its¶ use has had on national security and domestic society in the
realm of National Security,¶ wiretapping has
proven to be instrumental in the identification and prosecution
of terrorists, effectively helping to diminish this threat. In the domestic realm, wiretapping¶ has
proven to be an effective means of preventing terrorist attacks in the U.S., and of¶ putting Americans
at ease. The most obvious evidence that the use of wiretapping has been successful in¶ protecting
American national security is the "fact that there has been no serious terrorist¶ incident on American
shores since its passage in 2001" (Spangler, 2005, para. 13).¶ Senator Orrin Hatch, R-Utah, and a staunch defender of the Patriot
Act and its¶ wiretapping provisions, has pointed out that “because of necessary secrecy laws, we may¶ never know the full positive effects the
Patriot Act is having on terrorism” (Spangler,¶ 2005, para. 13). Hatch did however note that the Justice Department has credited key¶
provisions of the Patriot Act with playing a role in the terrorism-related convictions of¶ hundreds of suspects.
It has largely been the
tools of wiretapping and other forms of¶ electronic surveillance, which have received the credit for the
success of hundreds of¶ anti-terrorism operations since 2001. Most notable among these operations
was the¶ "recent apprehension in England of scores of suspects, who were charged with making¶ plans
to blow up as many as ten airliners traveling to the United States" (Criminal, 2006,¶ para. 24). In this operation,
electronic surveillance played an instrumental part in¶ allowing British agents to monitor the activities of a terrorist cell. "'We have been¶
looking at meetings, movement, travel, spending and the aspirations of a large group of¶ people' said Peter Clarke, head of Scotland Yard's antiterrorism branch" (ABCNews,¶ 2006, para. 2). In this case, British agents substantially monitored the terrorist cell before ¶ making the arrests.
(ABCNews, 2006, para. 24) Another such situation was the¶ uncovering of "evidence indicating that a Pakistani charity was diverting funds
originally contributed for earthquake relief to finance the planned terrorism attacks on these jumbo¶ jets" (Criminal, 2006, para. 16). It is,
however, difficult to attain the exact details of the¶ results of these operations, because in these investigations, "details leading up to the¶ filing
of formal charges is not usually revealed" (Criminal, 2006, para. 16). It is known¶ however, that since September 11, 2001 thousands of
individuals classified as terrorists¶ have been subjected to electronic surveillance procedures. The surveillance, specifically¶ wiretapping, of
individuals suspected of terrorist activities, has resulted in nearly a 20%¶ conviction rate (Criminal 2006).
Wiretaps Solve Crime
Wiretaps are instrumental in taking down domestic drug trafficking operations
Administrative Office of the U.S. Courts. 2012 (“Wiretap Report 2012”. Accessed 17 July 13.
http://www.uscourts.gov/Statistics/WiretapReports/wiretap-report-2012.aspx)
Federal and state prosecutors often discuss the importance of wiretap surveillance as an investigative
tool. A wiretap in the Eastern District of California uncovered incriminating cellular telephone
communications and text messages that led to the arrest of 32 individuals and the seizure of 19
vehicles, 35 firearms, $650,000 in cash, approximately 5,000 marijuana plants, and about 200 pounds
of processed marijuana. At the state level, a wiretap in Orange County, California, was instrumental in
solving a cold homicide case that occurred in 1988. Without the interceptions, the targeted subjects
probably would not have been arrested and would have escaped prosecution. A wiretap reported for a
previous year in a larceny investigation in Queens County, New York, revealed that a "sophisticated"
group of individuals were counterfeiting checks, money orders, and credit cards that were then used to
commit grand larceny and fraud. Credit-card making machines and counterfeit credit cards were seized,
and 12 individuals were apprehended. Several separate state jurisdictions reported that interceptions
were instrumental in uncovering drug-trafficking organizations operating in the United States.
Wiretaps are key to getting criminals to cooperate with law enforcement
Chang, Alisa. 2012 (Congressional reporter for NPR. “Wall Street Wiretaps: Investigators Use Insiders’
Own Words To Convict Them”. 26 Dec. Accessed 17 Dec 13.
http://www.npr.org/2012/12/26/168021457/wall-street-wiretaps-investigators-use-insiders-ownwords-to-convict-them)
But the problem was, most of these people they confronted would just lawyer up and resist. What the
feds needed was something to make people cooperate. And in early 2008, they decided, let's do a
wiretap. Many of them, like Carroll, were longtime organized crime and narcotics investigators. They
knew, in those worlds, when you needed leverage to make someone cooperate, you recorded them
planning something criminal.
Human Trafficking
Mobile Phone Searches Solve Human Trafficking
Mobile phones searches solve Human trafficking.
Mark Latonero, The Research Director at the University of southern California on Communication Leadership & Policy., “Rise of phones in
human trafficking” DoP: 2012 DoA: 7/17/13, https://technologyandtrafficking.usc.edu/the-rise-of-mobile-phones-in-human-trafficking/
Based on the evidence gathered in the previous section, a key finding of this report is that mobile
phones play a central role in
facilitating potential cases of DMST [ Domestic Minor Sexual Trafficking]. Online advertisements for potential
DMST victims commonly contain a mobile phone contact number. Logistical information such as time, place, pricing, and
types of services are communicated through phone calls or text messages on mobile phones. As an
increasing number of websites develop mobile applications, posting of advertisements can be done
primarily via mobile phone, as can viewing and responding to these advertisements.¶ Because the
social actors involved in trafficking can use mobile phones to communicate, coordinate, organize,
advertise, etc., the information transmitted across mobile networks could serve multiple evidentiary
and investigatory purposes. The widespread use of mobile phones can also be utilized for social outreach and interventions.¶ Scant
research or policy attention to date has focused on the issue of mobile phone use in DMST. The intersection of mobility, digital
technologies, and minor sex trafficking brings new challenges and opportunities that require careful research and
analysis.¶ For example, technology-facilitated sex trafficking networks often rely upon the anonymity or contrived identities of victims and
traffickers in order to operate.[1] According to Samantha Doerr, public affairs manager at Microsoft’s Digital Crimes Unit:¶ “Child sex trafficking
is simply a very different problem than other technology-facilitated child sexual exploitation … We need to look at the methods and language
used for advertising—how johns go about searching, the use of mobile phones in child sex trafficking, and how a transaction is
coordinated.”[2]¶ Although the
field of technology forensics is exploring ways to disrupt human trafficking
online by using trace data to identify perpetrators, mobile technology is already shifting the spaces
from which we can collect those traces.¶
Crime Impacts
Organized Crime Destroys Rule of Law
Organized crime undermines rule of law
United Nations Office of Drugs and Crime. 2013 (“Transnational organized crime threat
assessments”. Accessed 17 July 13. http://www.unodc.org/unodc/data-and-analysis/TOC-threatassessments.html)
The world population grows every year, and so does the volume of exchanges among people. The vast
majority of these exchanges are legitimate and beneficial, but a significant share is not. Transnational
criminal markets crisscross the planet, conveying drugs, arms, trafficked women, toxic waste, stolen
natural resources or protected animals' parts. Hundreds of billions of dollars of dirty money flow
through the world every year, distorting local economies, corrupting institutions and fuelling conflict.
Transnational organized crime has become a central issue in international affairs, an important factor
in the global economy, and an immediate reality for people around the world. Aside from the direct
effects - drug addiction, sexual exploitation, environmental damage and a host of other scourges organized crime has the capacity to undermine the rule of law and good governance, without which
there can be no sustainable development.
Drug Trade Impacts: Drugs & Crime Destroy Society – Laundry List
Drugs and crime destroy economies, erode social relations, undermine democracy,
and result in vigilantism
Office of the President of the United Nations General Assembly’s 66th Session. 2012
(“Thematic Debate of the 66th session of the United Nations General Assembly on Drugs and Crime as a
Threat to Development On the occasion of the UN International Day against Drug Abuse and Illicit
Trafficking”. 26 Jun. Accessed 17 July 13. http://www.un.org/en/ga/president/66/Issues/drugs/drugscrime.shtml)
Drugs and crime undermine[s] development by eroding social and human capital. This degrades
quality of life and can force skilled workers to leave, while the direct impacts of victimisation, as well as fear of crime, may
impede the development of those that remain. By limiting movement, crime impedes access to possible employment and
educational opportunities, and it discourages the accumulation of assets. Crime is also more “expensive” for poor
people in poor countries, and disadvantaged households may struggle to cope with the shock of victimisation .
Drugs and crime also undermine[s] development by driving away business. Both foreign and domestic
investors see crime as a sign of social instability, and crime drives up the cost of doing business. Tourism is a sector
especially sensitive to crime issues. Drugs and crime, moreover, undermine[s] the ability of the state to promote
development by destroying the trust relationship between the people and the state, and undermining
democracy and confidence in the criminal justice system. When people lose confidence in the
criminal justice system, they may engage in vigilantism, which further undermines the state.
Drug Trade Impacts: Drug Money Fuels Terrorism
The drug trade is a major source of terrorist income
McCraw, Steven C. 2003 (Assistant Director of the FBI Office of Intelligence. Testimony given before
the Senate Judiciary Committee. 20 May. Accessed 17 July 13.
http://www.fbi.gov/news/testimony/international-drug-trafficking-and-terrorism)
In framing the issue, the Committee astutely recognizes these links and the threat they present to the American people. That is why all
aspects of the terrorist enterprise including funding and support must be attacked. The criminal nexus to
terrorism including drug trafficking is why our local, state, and federal law enforcement partners throughout the
U.S. and the world are essential to combating global terrorism. They constitute an army of dedicated professionals who bring
tremendous resources and capabilities to the war on terrorism. In fact, the successes of the Joint Terrorism Task Forces are in large part to their
unwavering commitment to the safety of our nation and its citizens.¶ Today's Committee meeting focuses on the ties of drug trafficking and
international terrorism which is clearly a problem. Drug
trafficking is a highly lucrative enterprise generating billions
of dollars in profit that terrorist organizations can easily tap into. The ties between international terrorist
organizations and drug trafficking varies greatly from organization to organization. For example, the Fuerzas Armadas Revolucionarias de
Colombia (FARC), aka the Revolutionary Armed Forces of Colombia, is strongly tied to drug trafficking in Colombia. The
objective of the FARC is to overthrow the established order in Colombia and replace it with a socialist
dictatorship. In its attempts to destabilize the Government of Colombia, the FARC conducts bombings, extortions,
selective assassinations, kidnappings, and armed confrontations with Colombian police and military forces. In an
effort to finance its agenda, the FARC has conducted countless kidnappings for ransom of Colombian and foreign nationals, including the most
recent kidnaping/capture of American citizens in Colombia. They have also forced businesses to pay "war taxes" in exchange for FARC
protection. However, drug
trafficking profits are the FARC's principal source of funding. Moreover, it appears
much of their agenda is based upon protecting and exploiting drug trafficking operations in Colombia and
the region.¶ Historically, Afghanistan has been a major source of heroin throughout the world. Recently, al-Qa'ida
and Sunni extremists have been associated through a number of investigations with drug trafficking. We have
observed elements of the Taliban shipping and selling illegal drugs into the US. A recent joint FBI and DEA
investigation resulted in the arrests of 16 Afghan and Pakistani subjects for involvement in a drug ring that was possibly linked to Al-Qa'ida and
the Taliban. The investigation determined that heroin, grown and processed in Afghanistan and Pakistan, was being shipped to the U.S.
Profits from the sale of the heroin were laundered through Afghan and Pakistani owned businesses and then sent back to
associates of terrorist organizations. Criminal and financial links to the Taliban regime and their involvement with Al-Qa'ida were
established. The subjects were also involved in a number of other criminal activities including document/mail fraud, operating an illegal money
transmitting business, and other white collar crimes.¶ Historically, Hizballah's direct involvement in narcotics trafficking has been limited, and
the group's leaders have condemned the drug trade on religious grounds. However, we
have seen individuals with suspected
Hizballah ties involved in drug related activities and we believe that funds from these activities eventually
make their way to Hizballah coffers in Lebanon. The FBI has investigated and continues to investigate, efforts by individuals and
entities associated with Hizballah to traffic illegal drugs in the U.S. Acts of terrorism attributed to Hizballah have little or no
connection to narcotic issues. Rather, these acts were intended to further their political and terrorist
agendas. Hizballah utilizes funds from drug trafficking as one of many methods to fund these agendas.¶ By way of
example, the FBI conducted an investigation which employed an undercover operation to target Hizballah cells in the U.S. ¶ The investigation
has focused on distinct, but related, criminal enterprises which have participated in a host of criminal activity from fraud schemes to drug
trafficking to fund their activities and provide funds to the overall Hizballah organization. A number of the subjects have been indicted and the
investigation is continuing.¶ The Al-Ittihad al-Islami, or AIAI, Somalia's
largest militant Islamic organization, is suspected
of smuggling an illegal narcotic leaf known as Khat ("cot") into the United States. Arrests and shipment seizures indicate a sharp
increase in demand for the drug. Proceeds from East African Khat sales are likely remitted to Middle Eastern banks via Hawala network
and wire services. It is likely that these funds pass through the hands of suspected AIAI members and other persons
with possible ties to terrorist groups.¶ The bottom line is that terrorists and terrorist groups will resort to any method or means to
fund and facilitate their terrorist agendas. As state sponsorship of terrorism has come under greater international
condemnation, the tremendous profit potential associated with drug trafficking make it an attractive
from the perspective of terrorist groups. This is further evidence that the
prospect of terrorist-related drug trafficking
represents a continuing and significant threat to our national security.
Drug Trade Impacts: Drug Trade Causes Latin American Instability
Drug trafficking breeds instability in Latin America
Williams, Phil. Felbab-Brown, Vanda. 2012 (Phil Williams is the Director of the Matthew B. Ridgway
Center for International Security Studies at the University of Pittsburgh, and Vanda Felbab-Brown is a
fellow at the Latin American Initiative and 21st Century Defense Initiative in Foreign Policy at the
Brookings Institute. April. Accessed 17 July 13.
http://www.strategicstudiesinstitute.army.mil/pubs/people.cfm?authorID=850)
Burgeoning and unconstrained drug production and other illicit economies thus have profound negative consequences
for states and local stability. Most fundamentally, illicit economies provide an opportunity for belligerent
groups to increase their power along multiple dimensions not simply by gaining control of physical resources,
but also [and] by obtaining support from local populations. Such belligerents hence pose a serious security
threat to local governments and, depending on the objectives of the group, to regional and global security and U.S.
interests as well. With large financial profits, the belligerent groups improve their fighting capabilities by
increasing their physical resources, hiring greater numbers of better paid combatants, providing them with better weapons, and simplifying
their logistical and procurement chains. Crucially and frequently neglected in policy considerations, such
belligerents derive
significant political capital—legitimacy with and support from local populations—from their sponsorship of the drug
economy. They do so by protecting the local population’s reliable (and frequently sole source of) livelihood from the efforts of the
government to repress the illicit economy. They also derive political capital by protecting the farmers from brutal and unreliable traffickers, by
bargaining with traffickers for better prices on behalf of the farmers, by mobilizing the revenues from the illicit economies to provide otherwise
absent social services such as clinics and infrastructure, as well as other public goods, and by being able to claim nationalist credit if a foreign
power threatens the local illicit economy. In short, sponsorship
of illicit economies allows nonstate armed groups to
function as security providers and economic and political regulators. They are thus able to transform
themselves from mere violent actors to actors that take on proto-state functions.
Gangs Impacts: Gangs Cause Crime
Gangs are a major source of crime within the United States
Federal Bureau of Investigation. 2011 (“2011 National Gang Threat Assesment”. Acessed 17 July
13. http://www.fbi.gov/stats-services/publications/2011-national-gang-threat-assessment)
There are approximately 1.4 million active street, prison, and OMG gang members comprising more than
33,000 gangs in the United States. Gang membership increased most significantly in the Northeast and Southeast regions, although the West and Great
Lakes regions boast the highest number of gang members. Neighborhood-based gangs, hybrid gang members, and national-level gangs such as the Sureños are
rapidly expanding in many jurisdictions. Many communities are also experiencing an increase in ethnic-based gangs such as African, Asian, Caribbean,
and Eurasian gangs.¶ Gangs are responsible for an average of 48 percent of violent crime in most jurisdictions
and up to 90 percent in several others, according to NGIC analysis. Major cities and suburban areas experience the most gang-related
violence. Local neighborhood-based gangs and drug crews continue to pose the most significant criminal threat in most communities. Aggressive
recruitment of juveniles and immigrants, alliances and conflict between gangs, the release of
incarcerated gang members from prison, advancements in technology and communication, and Mexican
Drug Trafficking Organization (MDTO) involvement in drug distribution have resulted in gang expansion and violence in a
number of jurisdictions.¶ Gangs are increasingly engaging in non-traditional gang-related crime, such as alien smuggling, human
trafficking, and prostitution. Gangs are also engaging in white-collar crime such as counterfeiting, identity theft, and
mortgage fraud, primarily due to the high profitability and much lower visibility and risk of detection and punishment than drug and weapons trafficking. ¶
US-based gangs have established strong working relationships with Central American and MDTOs to
perpetrate illicit cross-border activity, as well as with some organized crime groups in some regions of the United States. US-based gangs and
MDTOs are establishing wide-reaching drug networks; assisting in the smuggling of drugs, weapons, and illegal immigrants along the Southwest Border; and serving
as enforcers for MDTO interests on the US side of the border.¶ Many gang members continue to engage in gang activity while incarcerated. Family members play
pivotal roles in assisting or facilitating gang activities and recruitment during a gang members’ incarceration. Gang members in some correctional facilities are
adopting radical religious views while incarcerated. ¶ Gangs encourage members, associates, and relatives to obtain
law enforcement,
judiciary, or legal employment in order to gather information on rival gangs and law enforcement
operations. Gang infiltration of the military continues to pose a significant criminal threat , as members
of at least 53 gangs have been identified on both domestic and international military installations. Gang members
who learn advanced weaponry and combat techniques in the military are at risk of employing these skills on the street when
they return to their communities.¶ Gang members are acquiring high-powered, military-style weapons and equipment
which poses a significant threat because of the potential to engage in lethal encounters with law enforcement officers and civilians. Typically firearms are acquired
through illegal purchases; straw purchases via surrogates or middle-men, and thefts from individuals, vehicles, residences and commercial establishments. Gang
members also target military and law enforcement officials, facilities, and vehicles to obtain weapons,
ammunition, body armor, police gear, badges, uniforms, and official identification.¶ Gangs on Indian Reservations often emulate
national-level gangs and adopt names and identifiers from nationally recognized urban gangs. Gang members on some Indian Reservations are associating with gang
members in the community to commit crime. ¶ Gangs
are becoming increasingly adaptable and sophisticated, employing new and
to facilitate criminal activity discreetly, enhance their criminal operations, and connect
with other gang members, criminal organizations, and potential recruits nationwide and even worldwide.
advanced technology
Gangs Impacts: Gangs Key to Drug Trade
U.S.-based gangs are integral to international drug trade operations
Schmidt, Mark. 2012 (Staff writer for the Combating Terrorism Center at West Point. “U.S. Gang
Alignment with Mexican Drug Trafficking Organizations”. 22 Mar. Accessed 17 July 13.
http://www.ctc.usma.edu/posts/u-s-gang-alignment-with-mexican-drug-trafficking-organizations)
MDTOs were in search of U.S.-based partners who would not cooperate with law enforcement. Accordingly, the loyalty and discipline
attributes of gangs made them ideal partners. Theoretically, the loyalty and discipline of U.S. gangs would hinder
cooperation with law enforcement, and thus better protect the drug trafficking operation. The success
of their working relationship is, in part, because gangs and Drug Trafficking Organizations (DTOs) are likeminded organizations. As criminal enterprises, loyalty, discipline, and territoriality are cornerstone philosophies
on how gangs and MDTOs manage their respective organizations. This is because criminal enterprises must
function in a covert capacity if they wish to survive law enforcement intervention and rival criminal
takeover. Without loyalty to the organization, whether a gang or a DTO, rivals and law enforcement could easily infiltrate and dismantle the
organization from the inside. Discipline is paramount to keep members inline so that their actions do not disrupt the organization or its
operations. Controlling and expanding one’s territory is also important to the survivability of the organization as it protects the economic area
of operation from competitors.
Drug Trade
Wikileaks Harms National Security
Wikileaks Threatens National Security
Wikileaks is a threat to national security and it is necessary to find the anonymous
sources posting classified information
Montabalno, Elizabeth (Staff Writer Information Weekly)Mar 2010 Army: Wikileaks A National Security
Threat http://www.informationweek.com/government/security/army-wikileaks-a-national-securitythrea/223900094 Date Accessed: 7/16/13
Wikileaks.org is considered a threat to national security because it posts classified intelligence
information, according to a 2008 U.S. Army document Wikileaks posted Monday.¶ The document,
attributed to the Army Counterintelligence Center and titled "Wikileaks.org -- An Online Reference to
Foreign Intelligence Services, Insurgents, or Terrorist Groups?", cited the leaking of classified Army
materials as the chief reason Wikileaks is harmful to national security.¶ "Such information could be of
value to foreign intelligence and security services (FISS), foreign military forces, foreign insurgents, and
foreign terrorist groups for collecting information or for planning attacks against U.S. force, both
within the United States and abroad," the document says.¶ The Army has tried to sniff out a possible
mole within its own ranks who might be leaking materials to Wikileaks, doubting the site's assertion that
it receives classified materials from former government agency employees, according to the
document.¶ "These claims are highly suspect, however, since Wikileaks.org states that the anonymity
and protection of the leakers or whistleblowers is one of its primary goals," according to the
document.¶ Because anyone can post to the site and there is no editorial oversight, the public may use
Wikileaks as a source of misinformation, or to create lies or propaganda to promote a positive or
negative image of a targeted audience, according to the document.
¶ The Army has sought not only to identify anyone within its own ranks leaking documents to the site,
but also to encourage other organizations to do the same to try to take the site down.¶ "Web sites
such as Wikileaks.org have trust as their most important center of gravity by protecting the anonymity
and identity of the insider, leaker, or whistleblower," the document stated. "Successful identification,
prosecution, termination of employment, and exposure of persons leaking the information by the
governments and businesses affected by information posted to Wikileaks.org would damage and
potentially destroy this center of gravity and deter others from taking similar actions."
Wikileaks harms national security and caused the death of foreign intelligence officers
Hoth, Jim (Author of Gateway Pundit, and Washington Post) May 2012 Horrible… Wikileaks Document
Led to Hanging Death of Western Spy This Week in Tehran
http://www.thegatewaypundit.com/2012/05/horrible-wikileaks-document-led-to-hanging-death-ofwestern-spy-this-week-in-tehran/
The leaked US documents by far left hero Bradley Manning and Wikileaks website led to the hanging
death this week of Western spy Majid Jamali Fashi in Tehran. The Wikileaks scandal led to the hanging
death of Western spy Majid Jamali Fashi in Tehran Times of Israel reported, via OrbusMax: WikiLeaks
may have been responsible for exposing Majid Jamali Fashi, the 24-year-old kickboxer who was hanged
in Tehran on Tuesday morning after “confessing” to assassinating a nuclear scientist on behalf of Israel,
a British media report said. The Times of London reported Wednesday that a document from the US
Embassy in Baku, Azerbaijan, seemingly drew attention to Fashi. The September 2009 US diplomatic
document — identified by the code 09BAKU687 — quotes an Iranian source who was a licensed martial
arts coach and trainer as describing to his American contacts pressure from the Iranian regime to train
soldiers and militiamen in martial arts. Fashi was reportedly in Baku for an international martial arts
competition only days before the US Embassy document was written. The suggestion is that the Iranian
authorities identified Fashi as someone who was in illicit contact with the West on the basis of the
document. He was arrested days after the publication of the document by WikiLeaks in December of
2010 and charged with carrying out the January 2010 assassination of nuclear scientist Masoud AliMohammadi on behalf of the Mossad.
Wikileaks is a specific threat to national security and is only the tip of the iceberg –
more groups and people will follow their example
Eric Sterner,
Fellow, The George C. Marshall Institute, February 2011, Date Accessed July 16,2013,
“Wikileaks and Cyberspace Cultures in Conflict”, The George C. Marshall Institute,
http://www.marshall.org/pdf/materials/931.pdf
Wikileaks and Assange represent a mindset as much as a specific security threat to the United States.
The mindset raises long-term challenges for U.S. national security. Even should the United States
successfully deny Wikileaks access to cyberspace and punish it in some fashion for harming U.S.
national security, other individuals and organizations will spring up and perform the same function.
Indeed, multiple mirror websites sprung up with archived Wikileaks data when the latter’s web
presence declined. Former Wikileaks associates have already started a new entity under the moniker
“OpenSecrets.Org.” Writing in The Washington Post, Tim Hwang calls them expansionists, “who hold
that the Web should remake the rest of the world in its own image. They believe that decentralized,
transparent and radically open networks should be the organizing principle for all things in society, big
and small.”9 One often finds a belief that cyberspace also liberates the individual, that it empowers
people to rise above the artificial constraints that social institutions place upon them. Thus, for
expansionists, it becomes essential to the spread of human liberty. Expansionists subscribe to a
certain worldview and often ascribe to themselves some higher responsibility to a principle that
should exempt them from state authority.10 Thus, some give little thought to “hacktivism” against
entities that do not share their worldview, ranging from corporations to governments. In other words,
Wikileaks only represents a surge in the tide of an expansionist worldview. Of course, it is not possible
to define a group that calls itself “expansionist” and subscribes to a specific doctrine. Rather,
expansionism as used here reflects a strain of loosely consistent thought when it comes to discussions of
cyberspace and its relation to society.
Wikileaks Threatens National Security
Wikileaks hurts diplomacy efforts, while justifying weapons proliferation and war
HEATHER HURLBURT, Executive Director of the National Security Network, November 30th, 2010, Date
Accessed July 16, 2013, “Why Wikileaks Is Bad for Progressive Foreign Policy”,
http://www.newrepublic.com/blog/jonathan-cohn/79483/wikileaks-round-iii-will-it-matter-much#
But underlying all those discrete policy positions is a common set of assumptions and values: that we
live in a complex world where posturing, rigid ideology, and indiscriminate use of force will not get us,
as a society or a global commons, to where we need to go; that quiet talk is much more effective than
loud threats; that, in the long run, America’s national interests will be best served if we see and act on
them as inextricably linked with the interests of others. I’ve called them progressive, because they are.
They’re also, with a bit less emphasis on the global good, realist. Or you might simply say they are sane
and reasonable. But if we can’t conduct quiet diplomacy and have it stay quiet, it’s a lot harder to
make this approach work. Could Sadat and Begin have gotten to Camp David without months of quiet
preparation? Could Nixon have gone to China?
And back here within the U.S., you can count upon the opponents of progressive policies to use the
Wikileaks dumps to advance their agenda. They'll take items out of context and use them to justify
ideas like bombing Iran, rejecting the START treaty, and god-knows-what to North Korea. The
Wikileakers claim to promote the politics of peace and moderation. But this latest dump could very
easily have the opposite effect, by giving the absolutists a chance to spread their stereotypes and
illusions of a black and white world.
Wikileaks Helps Terrorists
Wikileaks is detrimental to the government and helps terrorists plan and coordinate
attacks
Leanord, Tom (Staff writer The Telegraph) Mar 2010 Pentagon deems Wikileaks National Security
Threat http://www.telegraph.co.uk/technology/7475050/Pentagon-deems-Wikileaks-a-nationalsecurity-threat.html
WikiLeaks, a non-profit organization which tries to offer a means of anonymously exposing
confidential documents, has become a thorn in the side of governments and private corporations. Its
latest revelation concerns itself, namely a 2008 document attributed to the Army Counterintelligence
Centre which concluded that the site constitutes a threat to military operations and US security. The
information could be used by foreign intelligence, insurgents or terrorists for "planning attacks", the
report added. Its authors warned that the lack of editorial oversight over what could be posted could
lead to it being used to spread lies and propaganda. Their report also revealed that the army had tried
to discover the identity of a possible mole leaking information to the site. An army spokesman
confirmed to the New York Times that the document, which provided no specific evidence to support its
fears, was genuine. Leaks to the site that might have alarmed military chiefs include details of military
equipment, troop strengths and its publication in 2007 of almost the entire order of battle for US
forces in Iraq and Afghanistan. Wikileaks also published a copy of "standard operating procedures" at
the Guantánamo Bay detention centre which purportedly revealed the use of "extreme psychological
stress" on detainees. The website, which relies on donations, almost closed down this year because it
ran out of money. It has also faced attempts by governments such as those of North Korea and Thailand
to block access to its site.
Wikileaks Places Lives at Risk; Gives Terrorists a ‘hit list’.
Robert Winnett, Political Editor for the Daily Telegraph, July 30, 2010, Date Accessed July 16, 2013, The
Telegraph (UK), , “Wikileaks Afghanistan: Taliban ‘hunting down informants,”
http://www.telegraph.co.uk/news/worldnews/asia/afghanistan/7917955/Wikileaks-AfghanistanTaliban-hunting-down-informants.html
More dire, the most recent release included information that identified critical infrastructure
vulnerabilities. Earlier mass releases of classified information and unfiltered military reports from Iraq
and Afghanistan placed the lives of U.S. allies and pro-democracy forces at risk by, among other things,
giving terrorist groups a “hit list.”2
Wikileaks Hurts US-Pakistani Relations
Wikileaks hurts U.S. Pakistani Relations; Released Information Fuels Anti-American
sentiment
Jayshree Bajoria, South Asia researcher at Human Rights Watch, December 6, 2010, Date Accessed July
16th,2013, How WikiLeaks Hurts U.S.-Pakistan Ties, Council on Foreign Relations (CFR),
http://www.cfr.org/pakistan/wikileaks-hurts-us-pakistan-ties/p23565,
The release of thousands of U.S. diplomatic cables (NYT) by WikiLeaks.org has further shaken
Washington's already strained relations with Pakistan, a strategic ally central to any success in
Afghanistan and the fight against terrorism. The cables discuss U.S. concerns over Pakistan's
continued support for certain militant groups, its nuclear program, the country's fragile civil-military
relations, human rights abuses by Pakistan's security services, and more. Pakistani media has been
covering the cable leaks extensively, and some stories have further fueled anti-U.S. sentiment
(Reuters), with Pakistan's right-wing Islamist party Jamaat-e-Islami staging a rally Dec. 5 to protest
Pakistan's alliance (AFP) with the United States.
A2: Wikileaks Solves For Transparency
Wikileaks does not increase transparency – Bypassing the legal framework creates a
governmental backlash that leads to even more secrecy
Fenster, Mark. (Professor at the University of Florida) March 2012. Disclosure's Effects: WikiLeaks and
Transparency. http://works.bepress.com/cgi/viewcontent.cgi?article=1009&context=mark_fenster Date
Accessed: 7/17/2013
First, WikiLeaks’ ability to receive and distribute leaked information cheaply, quickly, and seemingly
unstoppably allows it to bypass the legal framework that would otherwise permit courts and officials
to consider and balance disclosure’s effects. For this reason, WikiLeaks threatens to make
transparency’s balance irrelevant.238 Second, its recent massive disclosures of U.S. military and
diplomatic documents, and the uneven and unpredictable effects they have had to date, should force
us to reconsider and test the assumption that disclosure produces effects that can serve as the basis
for judicial and administrative prediction, calculation, and balancing. For this reason, WikiLeaks
threatens transparency’s balance by disproving its assumption that disclosure guarantees measurable
consequences that can be estimated ex ante.
Turn: Wikileaks decreases transparency by creating a government backlash and
increased digital surveillance
Päivikki Karhula. (Staff Writer for International Federation of Libraries Association) Jan 2011 What is
the effect of WikiLeaksfor Freedom of Information?
http://www.ifla.org/files/assets/faife/publications/spotlights/wikileaks-karhula.pdf Date Accesed:
7/17/13
What is the possible impact of WikiLeaks? Is it going to increase or restore the space of free speech or
advance transparency of public documents? Or is it going to have the opposite effect and make
governments strengthen their restrictions and increase different forms of Internet censorship? There
are several valid concerns and evident signs about stricter legislation and more in depth surveillance
practices which may find their grounds on WikiLeaks. Shortly after cable leaks three US senators
(Ensign, Lieberman, Brown) introduced a bill aimed at stopping WikiLeaks by making it illegal to
publish the names of military or intelligence community informants. According to Brown, The Securing
Human Intelligence and Enforcing Lawful Dissemination Act (SHIELD) would prevent anyone from
compromising national security in the future in a similar manner to WikiLeaks.17 Another bill under
discussion would give the US government extended rights to wiretap all online communication and
Internet traffic including foreign-based service providers. The wiretapping bill would also require
software developers which enable peer-to-peer communication to redesign their service to allow
interception.18 Concerns have been raised if WikiLeaks is used to gain support for this legislation.19
A2: Wikileaks Solves For Transparency
Wikileaks hurts national security; slows declassification and openness in Gov’t
HEATHER HURLBURT, Executive Director of the National Security Network, November 30th, 2010, Date
Accessed July 16, 2013, “Why Wikileaks Is Bad for Progressive Foreign Policy”,
http://www.newrepublic.com/blog/jonathan-cohn/79483/wikileaks-round-iii-will-it-matter-much#
In the last few years, there has been some progress toward classifying fewer documents and using the
more rarefied classifications less frequently. This series of leaks will almost surely reverse that
progress. A top-secret classification would have kept any of these documents off the shared network
from which they were allegedly downloaded by a very junior soldier.
You can bet that the intelligence community will make that point—not only to justify stronger
classification of new documents but also to slow the declassification of old ones. Civilian
administrations at least since Clinton’s have been trying to speed up those efforts. Now they will go
even more slowly, making it harder to learn the whole story of how our government analyzed an
issue, treated an individual, or reacted to a crisis.
And make no mistake: You can't get the comprehensive history of a diplomatic episode from Wikileaks
any more than someone could learn the comprehensive truth about you by downloading the top 20 emails from your inbox right now.
Transparency
Uniqueness: Privacy Decreasing Now
No Privacy Now-Social Media
Palmer, Shelly. 06/16/2013. PRISM: There Simply is No Privacy... None.
http://www.huffingtonpost.com/shelly-palmer/prism-there-simply-is-no_b_3451721.html
Being an active member of a social networking community - whether it's Facebook, Twitter, or
anything else - means ceding a fair amount of privacy. The information, photos and check-ins you
share are already public information (to an extent), even if your security settings are maxed out.
Nothing you do on the Internet is truly private, and nothing you put on the Internet will ever really be
deleted. Surrendering your right to privacy is the price of living an Internet-based "connected" life.
There is an immense lack of digital privacy protection regarding mobile phones
Hubert A.-M. Moik. CEO of MobiDigger, a cell phone digital privacy company. August 2012. Protect
your privacy:¶ Mobile & Digital Privacy and Awareness.
http://www.mobidigger.com/2012/Privacy_Study_MobiDigger_2012.pdf. Date Accessed 7/17/13.
Contrary to conventional wisdom, privacy concerns are not limited to the Internet. It also ¶ encloses
mobile phones, which penetration in America reached 104.6% in 2011 (totaling 331.6 ¶ million subscribers) therefore exceeding the US
population1¶ . Even one-third of American ¶ households now have wireless device only2¶ . Users are largely unaware that cell
phone ¶ messages -even simple text messages- ultimately can end up in the hands of strangers and ¶
even on the Internet. Worse, for example, new “smart phones” send information about the ¶ phone’s
location to databases. Though such databases usually are not public, they also are not ¶ private; this information,
then can pose a danger to the person who uses their phone to ¶ communicate with strangers or other acquaintances, to whom they
normally would not reveal ¶ their locations. Private cell-phone information can also be revealed through a “reverse
search,” ¶ in which anyone can search a cell phone number to find the owner’s name and address.
Digital privacy has largely dissappeared
Amy Joi O'Donoghue. Writer for Deseret news.June 7 2013."Addressing the illusion of digital
privacy."Deseret News.http://www.deseretnews.com/article/865581375/Addressing-the-illusion-ofdigital-privacy.html?pg=all. Date Retrieved: July 17, 2013.
“You
can’t have 100 percent security and then also have 100 percent privacy and zero inconvenience,”
President Barack Obama said. “You know, we’re going to have to make some choices as a society.”¶
Some say that choice has already been made in the aftermath of 9/11, with the approval of the Patriot
Act that followed, and the pursuit of security at a time of free-flowing information of all types that
gives the nation's enemies — from individuals to organizations to nations — the ability to cause
catastrophic harm.¶ But it's a choice and policy being assessed this week in the halls of Washington, D.C., as well as in the burgs and
hamlets of the nation by individuals and families who increasingly use technology to navigate their lives.¶ "Digital privacy is an
illusion," said Eric Swedin, a professor at Weber State University who teaches history, particularly the history of technology. Swedin has also
taught computer science and has specialized in information security — such as how hacking works and how to defend a system against
hackers.¶ "When
you do something digitally, it can be monitored and copied. Corporations do this all the
time," Swedin said.¶ He said Google, for example, keeps track of searches.¶ "Google cares not about you as an individual, they care
about you as a marketing category … and this gives you ads that are discerned from your personal searches."¶ Swedin said digital
eavesdropping into cellphone records should not be a surprise given the wide-open nature of the Internet and the domestic security urgency
that gripped the nation in the wake of 9/11.¶ "You
can learn a lot really fast about a person just from looking at that
information," he said. "My suspicion, and it is just a suspicion, is that the intelligence community since
9/11 has been totally enamored with something called 'total information awareness.' It is this belief
that if you have enough data and the right kind of computer programs, you can find criminal behavior
before it happens."
Surveillance happening now, and Citizens like it
James Vlahos Contributing writer at The New York Times Contributing Editor at Popular Mechanics Contributing Editor at Popular Science
October 1, 2009. “Surveillance Society: New High-Tech Cameras Are Watching You Popular mechanics”,
http://www.popularmechanics.com/technology/military/4236865
Most Americans would probably welcome such technology at what clearly is a marquee terrorist target. An
ABC News/Washington
Post poll in July 2007 found that 71 percent of Americans favor increased video surveillance. What people
may not realize, however, is that advanced monitoring systems such as the one at the Statue of Liberty are proliferating
around the country. High-profile national security efforts make the news—wiretapping phone conversations,
Internet moniÂtoring—but state-of-the-art surveillance is increasingly being used in more every-day settings.
By local police and businesses. In banks, schools and stores. There are an estimated 30 million
surveillance cameras now deployed in the United States shooting 4 billion hours of footage a week.
Americans are being watched, all of us, almost everywhere. We have arrived at a unique moment in the history of surveillance.
The price of both megapixels and gigabytes has plummeted, making it possible to collect a previously
unimaginable quantity and quality of data. Advances in processing power and software, meanwhile, are beginning to allow
computers to surmount the greatest limitation of traditional surveillance—the ability of eyeballs to effectively observe the activity on dozens of
video screens simultaneously. Computers can't do all the work by themselves, but they can expand the capabilities of humans exponentially. ¶
Uniqueness: Privacy Violations Inevitable
Violations of our privacy are inevitable, the proliferation of security technology is
increasing rapidly.
Brin, David. Doctor of Philosophy in space science, 2010 fellow at the Institute of Ethics. 1998. The
Transparent Society. “Chapter One: The Challenge of an Open Society.”
http://www.davidbrin.com/transparentsociety1.html
Alas, they do appear to be our only options. For the cameras are on their way, along with data networks that will send a myriad
images flashing back and forth, faster than thought. ¶ In fact, the future has already arrived. The trend began in Britain a decade ago, in the town
of King's Lynn, where sixty remote-controlled video cameras were installed to scan known "trouble spots," reporting directly to police headquarters. The resulting
reduction in street crime exceeded all predictions; in or near zones covered by surveillance, crime dropped to one seventieth of the former amount. The savings in
patrol costs alone paid for the equipment in a few months. Dozens of cities and towns soon followed the example of King's Lynn. Glasgow, Scotland, reported a 68
percent drop in crime citywide, while police in Newcastle fingered over 1,500 perpetrators with taped evidence. (All but seven pleaded guilty, and those seven were
later convicted.) In May 1997, a thousand Newcastle soccer fans rampaged through downtown streets. Detectives studying the video reels picked out 152 faces and
published 80 photographs in local newspapers. In days, all were identified. ¶ Today over
300,000 cameras are in place throughout the
United Kingdom, transmitting round-the-clock images to a hundred constabularies, all of them reporting decreases in public misconduct. Polls
report that the cameras are extremely popular with citizens, though British civil libertarian John Wadham and others have
bemoaned this proliferation of snoop technology, claiming, "It could be used for any other purpose, and of course it could be abused." ¶ Visitors to Japan, Thailand,
and Singapore will see that other countries are rapidly following the British example, using closed circuit television (CCTV) to supervise innumerable public areas.*¶
This trend was slower coming to North America, but it appears to be taking off. After initial experiments garnered
widespread public approval, the City of Baltimore put police cameras to work scanning all 106 downtown intersections. In 1997, New York City began its own
program to set up twenty-four-hour remote surveillance in Central Park, subway stations and other public places. ¶ No
one denies the obvious
and dramatic short-term benefits derived from this early proliferation of surveillance technology. That is not
the real issue. Over the long run, the sovereign folk of Baltimore and countless other communities will have to make the same choices as the inhabitants of
our two mythical cities. Who will ultimately control the cameras?¶ Consider a few more examples:¶ How many parents have
wanted to be a fly on the wall while their child was at day care? This is now possible with a new video monitoring system known as
Kindercam, linked to high-speed telephone lines and a central Internet server. Parents can log on, type "www.kindercam.com," enter their password, and access a
live view of their child in day care at any time, from anywhere in the world. Kindercam will be installed in two thousand daycare facilities nationwide by the end of
1998. Mothers on business trips, fathers who live out of state, as well as distant grandparents can "drop in" on their child daily. Drawbacks? Overprotective parents
may check compulsively. And now other parents can observe your child misbehaving! ¶ Some of the same parents are less happy about the lensed pickups that are
sprouting in their own workplaces, enabling supervisors to tune in on them the same way they use Kindercam to check up on their kids.¶ That is, if they notice the
cameras at all.
At present, engineers can squeeze the electronics for a video unit into a package smaller
than a sugar cube. Complete sets half the size of a pack of cigarettes were recently offered for sale by the Spy Shop, a little store in New York City located
two blocks from the United Nations. Meanwhile, units with radio transmitters are being disguised in clock radios, telephones
and toasters, as part of the burgeoning "nannycam" trend. So high is demand for these pickups, largely by parents eager to check on their babysitters, that just one
firm in Orange County, California, has recently been selling from five hundred to one thousand disguised cameras a month. By the end of 1997, prices had dropped
from $2,500 to $399.¶ Cameras
aren't the only surveillance devices proliferating in our cities. Starting with Redwood City, near
San Francisco, several police departments have begun lacing neighborhoods with sound pickups that transmit directly
back to headquarters. Using triangulation techniques, officials can now pinpoint bursts of gunfire and send patrol units swiftly to the scene, without having to wait
for vague phone reports from neighbors. In 1995 the Defense Department awarded a $1.7 million contract to Alliant Techsystems for its prototype system SECURES,
which tests more advanced sound pickup networks in Washington and other cities. The hope is to distinguish not only types of gunfire but also human voices crying
for help.¶ So far, so good. But from there, engineers say it would be simple to upgrade the equipment, enabling bored monitors
to eavesdrop through open bedroom windows on cries of passion, or family arguments. "Of course we would never go that far," one official said, reassuringly.¶
Consider another piece of James Bond apparatus now available to anyone with ready cash. Today, almost
any electronics store will sell you
night vision goggles using state-of-the-art infrared optics equal to those issued by the military, for less than
the price of a video camera. AGEMA Systems, of Syracuse, New York, has sold several police departments imaging devices that can peer into houses from the street,
discriminate the heat given off by indoor marijuana cultivators, and sometimes tell if a person inside moves from one room to the next. Military and civilian
enhanced-vision technologies now move in lockstep, as they have in the computer field for years.¶ In other words, even
darkness no longer
guarantees privacy.¶ Nor does your garden wall. In 1995, Admiral William A. Owens, then Vice-Chairman of the Joint Chiefs of Staff,
described a sensor system that he expected to be operational within a few years: a pilotless drone, equipped to provide airborne surveillance for soldiers
in the field. While camera robots in the $1 million range have been flying in the military for some time, the new system will be
extraordinarily cheap and simple. Instead of requiring a large support crew, it will be controlled by one semi-skilled soldier and will fit in the palm of a hand.
Minuscule and quiet, such remote-piloted vehicles, or RPVs, may flit among trees to survey threats near a rifle platoon. When mass-produced in huge quantities,
unit prices will fall.¶ Can
civilian models be far behind? No law or regulation will keep them from our cities for
contraptions will get smaller,
very long. The rich, the powerful, and figures of authority will have them, whether legally or surreptitiously. The
cheaper, and smarter with each passing year.¶ So much for the supposed privacy enjoyed by sunbathers in their own back yards.¶ Moreover,
surveillance cameras are the tip of the proverbial iceberg. Other entrancing and invasive innovations of the vaunted information age abound. Will a paper envelope
protect the correspondence you send by old-fashioned surface mail when new-style scanners can trace the patterns of ink inside without ever breaking the seal? ¶
say you correspond with others by email and use a computerized encryption program to ensure that your messages
good will all the ciphers and codes do, if some adversary has bought a "back
door" password to your encoding program? Or if a wasp-sized camera-drone flits into your room, sticks to
Let's
are only read by the intended recipient. What
the ceiling above your desk, inflates a bubble lens and watches every key-stroke that you type? (A number of unnerving techno-possibilities will be discussed in
chapter 8.)¶ In late 1997 it was revealed that Swiss police had secretly tracked the whereabouts of mobile phone users via
a telephone company computer that records billions of movements per year. Swisscom was able to locate its mobile subscribers within a few hundred meters. This
aided several police investigations. But civil libertarians expressed heated concern, especially since identical
technology is used worldwide.¶
The same issues arise when we contemplate the proliferation of vast databases containing information about our
lives, habits, tastes and personal histories. As we shall see in chapter 3, the cash register scanners in a million supermarkets, video stores, and pharmacies
already pour forth a flood of statistical data about customers and their purchases, ready to be correlated. (Are you stocking up on
hemorrhoid cream? Renting a daytime motel room? The database knows.) Corporations claim this information helps them serve us more efficiently. Critics respond
that it gives big companies an unfair advantage, enabling them to know vastly more about us than we do about them. Soon,
computers will hold
all your financial and educational records, legal documents, and medical analyses that parse you all the way down
to your genes. Any of this might be examined by strangers without your knowledge, or even against your stated
will.
Now is the Key Time for Transparency
The rise of Technological Surveillance Era is among us, and the result will determine
our future.
Brooke, Heather (Campaigning Journalist and Writer for The Guardian) Nov 2010 WikiLeaks: the
revolution has begun – and it will be digitized.
http://www.guardian.co.uk/commentisfree/2010/nov/29/the-revolution-will-be-digitised Date
Accessed: 7/17/13
But data has a habit of spreading. It slips past military security and it can also leak from WikiLeaks, which is how I
came to obtain the data. It even slipped past the embargoes of the Guardian and other media organizations involved in this story when a rogue
copy of Der Spiegel accidentally went on sale in Basle, Switzerland, on Sunday. Someone bought it, realised what they had, and began scanning
the pages, translating them from German to English and posting updates on Twitter. It would seem digital data respects no authority,
be it the Pentagon, WikiLeaks or a newspaper editor.¶ Individually, we have all already experienced the massive
changes resulting from digitisation. Events or information that we once considered ephemeral and private are
now aggregated, permanent, public. If these cables seem large, think about the 500 million users of Facebook or
the millions of records kept by Google. Governments hold our personal data in huge databases. It used to cost
money to disclose and distribute information. In the digital age it costs money not to.¶ But when data breaches
happen to the public, politicians don't care much. Our privacy is expendable. It is no surprise that the reaction to
these leaks is different. What has changed the dynamic of power in a revolutionary way isn't just the scale of the
databases being kept, but that individuals can upload a copy and present it to the world . In paper form, these cables
equate, on the Guardian's estimate, to some 213,969 pages of A4 paper, which would stack about 25m high – not something that one could
have easily slipped past security in the paper age.¶ To some this marks a crisis, to others an opportunity. Technology is
breaking down traditional social barriers of status, class, power, wealth and geography – replacing them with an
ethos of collaboration and transparency.¶ The former US ambassador to Russia James Collins told CNN the
disclosure of the cables, "will impede doing things in a normal, civilised way". Too often what is normal and
civilised in diplomacy means turning a blind eye to large-scale social injustices, corruption and abuse of power.
Having read through several hundred cables, much of the "harm" is embarrassment and the highlighting of
inconvenient truths. For the sake of a military base in a country, our leaders accept a brutal dictator who
oppresses his population. This may be convenient in the short term for politicians, but the long-term
consequences for the world's citizens can be catastrophic.¶ Leaks are not the problem; they are the symptom.
They reveal a disconnect between what people want and need to know and what they actually do know. The
greater the secrecy, the more likely a leak. The way to move beyond leaks is to ensure a robust regime for the
public to access important information.¶ Thanks to the internet, we have come to expect a greater level of
knowledge and participation in most areas of our lives. Politics, however, has remained resolutely
unreconstructed. Politicians, see themselves as parents to a public they view as children – a public that cannot
be trusted with the truth, nor with the real power that knowledge brings.¶ Much of the outrage about WikiLeaks is not
over the content of the leaks but from the audacity of breaching previously inviolable strongholds of authority. In the past, we deferred
to authority and if an official told us something would damage national security we took that as true. Now the
raw data behind these claims is increasingly getting into the public domain. What we have seen from disclosures
like MPs' expenses or revelations about the complicity of government in torture is that when politicians speak of
a threat to "national security", often what they mean is that the security of their own position is threatened.¶
We are at a pivotal moment where the visionaries at the vanguard of a global digital age are clashing with those
who are desperate to control what we know. WikiLeaks is the guerrilla front in a global movement for greater
transparency and participation. There are projects like Ushahidi that use social networking to create maps
where locals can report incidents of violence that challenge the official version of events. There are activists
seeking to free official data so that citizens can see, for example, government spending in detail .¶ Ironically, the US
state department has been one of the biggest cheerleaders for technical innovation as a means of bringing democracy to places like Iran and
China. President Obama has urged repressive regimes to stop censoring the internet, yet a bill before Congress would allow the attorney
general to create a blacklist of websites. Is robust democracy only good when it's not at home?¶ It used to be that a leader controlled
citizens by controlling information. Now it's harder than ever for the powerful to control what people read, see
and hear. Technology gives people the ability to band together and challenge authority. The powerful have long
spied on citizens (surveillance) as a means of control, now citizens are turning their collected eyes back upon the
powerful (sousveillance).¶ This is a revolution, and all revolutions create fear and uncertainty. Will we move to a
New Information Enlightenment or will the backlash from those who seek to maintain control no matter the
cost lead us to a new totalitarianism? What happens in the next five years will define the future of democracy
for the next century, so it would be well if our leaders responded to the current challenge with an eye on the
future.
Link: Pretending Privacy Exists Masks Surveillance (1/2)
We can never go back to an age with complete privacy, governments that claim to do
so are simply making surveillance more hidden. The only option is to encourage
accountability through complete transparency.
Brin, David. Doctor of Philosophy in space science, 2010 fellow at the Institute of Ethics. 1998. The
Transparent Society. “Chapter One: The Challenge of an Open Society.”
http://www.davidbrin.com/transparentsociety1.html
The issue of threatened privacy has spawned a flood of books, articles and media exposés — from Janna Malamud
Smith's thoughtful Private Matters, and Ellen Alderman and Caroline Kennedy's erudite Right to Privacy all the way to shrill, paranoiac
rants by conspiracy fetishists who see Big Brother lurking around every corner. Spanning this spectrum, however,
there appears to be one common theme. Often the author has responded with a call to arms, proclaiming that
we must become more vigilant to protect traditional privacy against intrusions by faceless (take your pick) government
bureaucrats, corporations, criminals, or just plain busybodies.¶ That is the usual conclusion — but not the one taken here.¶ For in fact, it is
already far too late to prevent the invasion of cameras and databases. The djinn cannot be crammed
back into its bottle. No matter how many laws are passed, it will prove quite impossible to legislate
away the new surveillance tools and databases. They are here to stay.¶ Light is going to shine into nearly
every corner of our lives.¶ The real issue facing citizens of a new century will be how mature adults choose to live
— how they might compete, cooperate and thrive — in such a world. A transparent society.¶ Regarding those cameras for instance —
the ones topping every lamppost in both city one and city two — we can see that very different styles of urban life resulted from just one
decision, based on how people in each town answered the following question.¶ Will average citizens share, along with the mighty, the right to
access these universal monitors? Will common folk have, and exercise, a sovereign power to watch the watchers?¶ Back in
city number
one, Joe and Jane Doe may walk through an average day never thinking about those microcameras overhead.
They might even believe official statements claiming that all the spy eyes were banished and dismantled a year
or two ago, when in fact they were only made smaller, harder to detect. Jane and Joe stroll secure that
their neighbors cannot spy on them (except the old-fashioned way, from overlooking windows). In other words, Jane and Joe
blissfully believe they have privacy.¶ The inhabitants of city number two know better. They realize that, out of
doors at least, privacy has always been an illusion. They know anyone can tune in to that camera on the
lamppost — and they don't much care. They perceive what really matters: that they live in a town
where the police are efficient, respectful, and above all accountable. Homes are sacrosanct, but out on the street
any citizen, from the richest to the poorest, can walk both safely and use the godlike power to zoom at will from vantage point to vantage
point, viewing all the lively wonders of the vast but easily spanned village their metropolis has become, as if by some magic it had turned into a
city not of people but of birds.¶ Sometimes, citizens of city number two find it tempting to wax nostalgic about the old days, before there were
so many cameras, or before television invaded the home, or before the telephone and automobile. But for the most part, city number two's
denizens know those times are gone, never to return. Above all, one
thing makes life bearable: the surety that each
person knows what is going on, with a say in what will happen next. And has rights equal to those of any
billionaire or chief of police
Link: Pretending Privacy Exists Masks Surveillance (2/2)
People have been calling for individuals to retain absolute privacy online, but these
merely cover up the inevitability of surveillance.
Brin, David. Doctor of Philosophy in space science, 2010 fellow at the Institute of Ethics. 1998. The
Transparent Society. “Chapter One: The Challenge of an Open Society.”
http://www.davidbrin.com/transparentsociety1.html
Recent years have witnessed widespread calls to "empower" citizens and corporations with tools of
encryption — the creation of ciphers and secret codes — so that the Internet and telephone lines may soon fill with a
blinding fog of static and concealed messages, a haze of habitual masks and routine anonymity. Some of society's best
and brightest minds have begun extolling a coming "golden age of privacy," when no one need ever
again fear snooping by bureaucrats, federal agents, or in-laws. The prominent iconoclast John Gilmore, who "favors law 'n' chaos over
law 'n' order," recently proclaimed that computers are literally extensions of our minds, and that their contents should remain as private as our
inner thoughts. Another activist, John Perry Barlow, published a widely discussed "A Declaration of Independence of Cyberspace" proclaiming
that the mundane jurisdictions of nations and their archaic laws are essentially powerless and irrelevant to the Internet and its denizens (or
"netizens"). Among the loose clan of self-proclaimed "cypherpunks," a
central goal is that citizens should be armed with
broad new powers to conceal their words, actions, and identities. The alternative, they claim, will be
for all our freedoms to succumb to a looming tyranny.¶ In opposing this modern passion for personal and corporate
secrecy, I should first emphasize that I like privacy! Outspoken eccentrics need it, probably as much or more than those who are reserved. I
would find it hard to get used to living in either of the cities described in the example at the beginning of this chapter. But a few voices out
there have begun pointing out the obvious. Those
cameras on every street corner are coming, as surely as the new
"privacy laws" really prevent hidden eyes from getting tinier,
more mobile and clever? In software form they will cruise the data highways . "Antibug" technologies will arise, but the
resulting surveillance arms race can hardly favor the "little guy." The rich, the powerful, police
agencies, and a technologically skilled elite will always have an advantage.
millennium.¶ Oh, we may agitate and legislate. But can
Alternative Solvency: Transparency Checks Government Oppression
(1/2)
Transparency solves-only by instilling the need for openness can we adequately be
aware of what’s going on to adequately criticize the government and make them
accountable
Brin, David. Doctor of Philosophy in space science, 2010 fellow at the Institute of Ethics. 1998. The
Transparent Society. “Chapter One: The Challenge of an Open Society.”
http://www.davidbrin.com/transparentsociety1.html
What distinguishes society today is not only the pace of events but also the nature of our tool kit for facing the future. Above all, what has
marked our civilization as different is its knack for applying two extremely hard-won lessons from the past.¶ In all of history, we
have
found just one cure for error — a partial antidote against making and repeating grand, foolish mistakes, a remedy
against self-deception. That antidote is criticism.¶ Scientists have known this for a long time. It is the keystone of their success.
A scientific theory gains respect only by surviving repeated attempts to demolish it. Only after platoons of
clever critics have striven to come up with refuting evidence, forcing changes, do a few hypotheses eventually graduate from mere theories to
accepted models of the world.¶ Another
example is capitalism. When it works, under just and impartial rules, the free market
rewards agility, hard work and innovation, just as it punishes the stock prices of companies that make too many mistakes. Likewise, any
believer in evolution knows that death is the ultimate form of criticism, a merciless driver,
transforming species over time.¶ Even in our private and professional lives, mature people realize that improvement
comes only when we open ourselves to learn from our mistakes, no matter how hard we have to grit our teeth, when
others tell us we were wrong. Which brings up a second observation.¶ Alas, criticism has always been what human beings,
especially leaders, most hate to hear.¶ This ironic contradiction, which I will later refer to as the "Paradox of the Peacock," has had
profound and tragic effects on human culture for centuries. Accounts left by past ages are filled with woeful events in
which societies and peoples suffered largely because openness and free speech were suppressed,
leaving the powerful at liberty to make devastating blunders without comment or consent from below.¶ If neo-Western
civilization* has one great trick in its repertoire, a technique more responsible than any other for its success, that trick is
accountability. Especially the knack — which no other culture ever mastered — of making accountability apply to the
mighty. True, we still don't manage it perfectly. Gaffes, bungles and inanities still get covered up. And yet, one can look
at any newspaper or television news program and see an eager press corps at work, supplemented by hordes of righteously indignant
individuals (and their lawyers), all baying for waste or corruption to be exposed, secrets to be unveiled, and nefarious schemes to be nipped in
the bud. Disclosure is a watchword of the age, and politicians have grudgingly responded by passing the Freedom of Information Act (FOIA),
truth-in-lending laws, open-meeting rules, then codes to enforce candor in real estate, in the nutritional content of foodstuffs, in the expense
accounts of lobbyists, and so on.¶ Although this process
of stripping off veils has been uneven, and continues to be a source
of contention, the underlying moral force can be clearly seen pervading our popular culture, in which nearly every
modern film or novel seems to preach the same message — suspicion of authority. The phenomenon is not new to our generation.
Schoolbooks teach that freedom is guarded by constitutional "checks and balances," but those same legal
provisions were copied, early in the nineteenth century, by nearly every new nation of Latin America, and not
one of them remained consistently free. In North America, constitutional balances worked only because
they were supplemented by a powerful mythic tradition, expounded in story, song, and now virtually every Hollywood
film, that any undue accumulation of power should be looked on with concern.¶ Above all, we are encouraged to distrust
government.¶ The late Karl Popper pointed out the importance of this mythology in the dark days during and after World War II, in The
Open Society and its Enemies. Only by insisting on accountability, he concluded, can we constantly remind public
servants that they are servants. It is also how we maintain some confidence that merchants aren't cheating us, or that factories
aren't poisoning the water. As inefficient and irascibly noisy as it seems at times, this habit of questioning authority ensures
freedom far more effectively than any of the older social systems that were based on reverence or
trust.¶ And yet, another paradox rears up every time one interest group tries to hold another accountable in today's society.¶ Whenever
a conflict appears between privacy and accountability, people demand the former for themselves and
the latter for everybody else.¶ The rule seems to hold in almost every realm of modern life, from special prosecutors investigating
the finances of political figures to worried parents demanding that lists of sex offenders be made public. From merchants anxious to see their
customers' credit reports to clients who resent such snooping. From people who "need" caller ID to screen their calls to those worried that their
lives might be threatened if they lose telephone anonymity. From activists demanding greater access to computerized government records in
order to hunt patterns of corruption or incompetence in office to other citizens who worry about release of personal information contained in
those very same records.
Alternative Solvency: Transparency Checks Government Oppression
(2/2)
Transparency is key to government accountability when it comes to digital privacy
Notley, Tanya. Journalist. 4 August 2011. Why digital privacy and security are important for
development. http://www.guardian.co.uk/global-development/poverty-matters/2011/aug/04/digitaltechnology-development-tool. Date Accessed 7/17/13.
If you believe an over-arching ambition of development should be to ensure the benefits of progress and plenty are shared fairly among
citizens, then you will likely agree
it's important to have a government willing to create policies that attempt
to remedy existing inequities. To do this in a democratic way, these policies, and the practices to
implement them, need to be transparent to ensure people can assess how government and
development money is being spent, where it is being distributed and if it achieves what was
intended.¶ Access to information technologies – such as mobile phones, the internet, social
networking sites and video – can play a critical role in helping people hold governments and
development agencies accountable. When used to collect, monitor and assess information about needs, spending, activities and
impacts, technologies support not only accountability but also – by allowing people to participate in their own governance – freedom of
expression and civic participation.
Neg
Privacy
Constitution-Right to Privacy
The constitution has the right to privacy engrained inside of it.
Ralph F. Gaebler, professor of law at Indiana state university, “Is There a Natural Law Right to Privacy?”
DoP: 1992, THE AMERICAN JOURNAL OF JURISPRUDENCE,
http://www.repository.law.indiana.edu/cgi/viewcontent.cgi?article=1659&context=facpub
Walter Murphy has recently argued that "the nature of the American¶ Constitution requires recognition of a thick
and powerful right to be¶ let alone."' What is more, he believes this right is so deeply embedded¶ in the
Constitution that society cannot remove it, even through¶ formally permissible means, such as
amendment, without abrogating¶ the Constitution altogether.¶ In general, there is nothing particularly
surprising about the claim¶ that the Constitution includes a right of privacy. And in Murphy's¶ case, in particular,
the claim rests upon thirty years of scholarship.¶ Viewed as a whole, this body of work looms as one of the more¶
passionate, and at the same time formidably coherent contributions¶ to the literature of judicial
politics. 2 As developed in his many articles¶ and books, Murphy's claim for the existence of a right of privacy¶
emerges from his conviction that, since all Constitutional decision makers must adopt a judicial
philosophy with substantive¶ consequences, academic critics, in judging the judges, must in fairness
do the same.' His is essentially a pragmatic claim, justified on the¶ ground that it constitutes the best constitutional policy in a world of¶
judicial politics where many legitimate and contradictory claims are¶ possible
The constitution implies the right to privacy through the as citizens bring in the natural
right for a zone of autonomy
Ralph F. Gaebler, professor of law at Indiana state university, “Is There a Natural Law Right to Privacy?”
DoP: 1992, THE AMERICAN JOURNAL OF JURISPRUDENCE,
http://www.repository.law.indiana.edu/cgi/viewcontent.cgi?article=1659&context=facpub
Murphy makes two distinct arguments to support his conclusion¶ that the Constitution must be interpreted to include a
broad right of¶ privacy. He describes the first argument as based on "constitutional¶ content." It begins
with the assertion that the American Constitution¶ rests upon, or possibly even includes, two political theories, which¶
he calls "constitutionalism" and "representational democracy."¶ Constitutionalism denotes the view
that the Constitution primarily¶ embodies personal liberties. Representational democracy denotes
the¶ view that the Constitution primarily embodies a structure of¶ government based on popular
sovereignty. Although poised in¶ opposition to each other, both of these sub-texts are necessary to¶ make sense of the Constitution, or as
Murphy puts it, to render the¶ document more than "the political version of a seed catalogue." In¶ other words, the Constitution is a
balancing act; it employs the device of checks and counter-checks not only in its provisions for the¶
structure of government, but even in its philosophical outlook. However, constitutionalism is clearly the
more important philosophy¶ of the two, at least for the purpose of establishing the right of¶ privacy.' 2 "The essence
of constitutionalism," according to Murphy,¶ "is that citizens bring rights with them into society." These rights¶
comprise a "zone of autonomy," within which "each individual¶ should be immune from
governmental regulation, even regulation¶ that an overwhelming majority of society considers wise
and just."¶ Thus, the right to privacy is implied by the political theory of¶ constitutionalism, which in turn is
part of the Constitution. Murphy¶ also argues that the right of privacy is implied by the theory of¶ representational democracy, a claim that I
will take up later.
The constitution provides a right to privacy by the use of wording such as free and
autonomous
Ralph F. Gaebler, professor of law at Indiana state university, “Is There a Natural Law Right to Privacy?”
DoP: 1992, THE AMERICAN JOURNAL OF JURISPRUDENCE,
http://www.repository.law.indiana.edu/cgi/viewcontent.cgi?article=1659&context=facpub
Murphy's second argument, which he describes as based on¶ "constitutional function," is equally direct. It begins with his¶ commitment to the
ideas that the
Constitution is a "binding statement¶ of a people's aspirations for themselves and their nation." In
Constitution is not merely a charter for government, but¶ serves as the foundation of a
moral community as well. From this¶ premise Murphy argues that the Constitution must include a right of¶
privacy because "the notion of a people as free and autonomous as¶ they can be in an
interdependent world is and has been among the¶ values, goals, and aspirations of U.S. society."¶
other¶ words, the
.Murphy finds evidence of the Constitution's "aspirational" character¶ in its Preamble and in the Declaration of Independence, which he¶ also
regards as a foundational document. Thus, Murphy really regards¶ the U.S. as bound by a constitution, that includes the
Constitution¶ of 1787, as amended, the Declaration of Independence, the two¶ political philosophies already mentioned, and possibly other¶
foundational documents or ideas as well.' 3 This is not to say that we can understand Murphy's argument simply by reading, phrase by¶ phrase,
his admittedly expanded constitution. In a sense, this argument¶ denies that the Constitution can be read at all; rather, it is a¶ continuing
compact, some of whose evidence is composed of written¶ documents.
Privacy Viewed As A Societal Good
We ought to protect Privacy as a Social good rather than an individual right.
DANIEL J. SOLOVE, 2002, Assistant Professor, Seton Hall Law School, DIGITAL DOSSIERS AND THE DISSIPATION OF FOURTH
AMENDMENT PRIVACY, http://www-bcf.usc.edu/~usclrev/pdf/075502.pdf
Protecting privacy through an architecture of power differs from protecting it as an individual right .
Privacy is often viewed as an individual right.185 It is seen as an individual possession, and its value is defined in
terms of its worth to the individual. This view is severely flawed. John Dewey astutely critiqued the “conception of
the individual as something given, complete in itself, and of liberty as a ready-made possession of the individual, only needing the removal of
external restrictions in order to manifest itself.”186 According to Dewey, the
individual is inextricably connected to
society,187 and rights are not immutable possessions of individuals, but are instrumental in light of
“the contribution they make to the welfare of the community.”188 The problem with viewing rights in
purely individualistic terms is that it pits individual rights against the greater good of the community,
with the interests of society often winning out because of their paramount importance when measured against
one individual’s freedom In contrast, an architecture of power protects privacy differently and is based on
a different conception of privacy. Privacy is not merely a right possessed by individuals, but is a form of freedom
built into the social structure. It is thus an issue about the common good as much as it is about individual rights. It is an issue
about social architecture, about the relationships that form the structure of our society.
Privacy Must Be Preferred
We should promote supporting privacy over the national security interests, or a hybrid
of both. We must err on the side of privacy because governments are likely to abuse
their power.
Lisa Nelson, 2004, University of Pittsburg, Privacy and Technology: Reconsidering a Crucial Public Policy Debate in the Post-September
11 Era, Public Administration Review,
The origin of liberty in democratic theory is best de- scribed by John Stuart Mill as "the civil or social
liberty which exists within the nature and limits of the power which can be legitimately exercised by
society over the individual" (Mill 1956, 2). As Mill explains, the balance between lib- erty and authority is struck
by guaranteeing certain immu- nities that cannot be violated by those holding political authority. If
violated, those in positions of authority have breached their duty as leaders. As a secondary check on political
authority, constitutional checks that are established by the consent of the community are a necessary condition of the acts of governing power
(Mill 1956, 4). In
practice, this means the exercise of political authority is mediated by the immunities of
the citizenry and the consent of the governed. The liberty interest in privacy is construed similarly. To paraphrase Justice
Robert H. Jackson in his concurring opinion on the 1952 Youngstown Sheet and Tube Co. v. Sawyer (343 U.S. 579) decision, "the Fourth
Amendment protects more than privacy; it ensures that governmental invasions of individual privacy
are based upon rules estab- lished by the people, rules our rulers must follow in order to engage in
surveillance." Jackson's description of pri- vacy mirrors that of Mill. The conditions of our liberty interest in privacy are
created by the immunities of the citizenry and the consent of the governed. Each serves as a limit on political
authority. Yet, the analysis is not quite so simple. The equilibrium of this balance between political authority and the liberty
interests of individuals is changed in the face of harm. As Mill explains, government should be established on the
harm principle: "That the sole end for which mankind is warranted, individually or collec- tively, in interfering with the liberty of action of
any of their number, is self-protection. That the only purpose for which power can be rightfully exercised over
any member of a civilized community, against his will, is to prevent harm to others" (Mill 1956, 4). The
authority to interfere with a member of a civilized community in defense of liberty occurs when there is a need to prevent harm. In fact, as Mill
argues, "it is
one of the undisputed functions of government to take precau- tions against crime before it
has been committed, as well as to detect and punish it afterwards" (Mill 1956, 116). Liberty, augmented in
our constitutional framework by the principles of privacy, is mediated by the exercise of political
authority to protect against harm. What is left unanswered is the type and form of political authority that is ideal for preserving
our liberty interests in privacy. In theory, the answer seems quite simple: The exercise of political authority is
justified when the political will nec- essary for the prevention of harm is warranted. Yet, as a practical matter,
the perception of harm-and the justifi- cation of political authority necessary to combat it-is often problematic. As Mill warns, "the
preventative func- tion of government, however, is far more liable to be abused, at the prejudice of
liberty, than the punitive func- tion" (Mill 1956, 116). This concern is particularly acute in the post-September 11 environment
because it is not only the assertion of political authority, but also the architecture of it that potentially threatens our liberty interest in privacy.
Far-reach- ing regulations that enable the gathering and sharing of information, the concentration of
power in the hands of the intelligence community, and the extensive power granted to the executive
branch in the name of the "war on terrorism" is seen as altering the structural balance between
political authority and social and civil liberties at the expense of democratic principles. The call for increased
political authority to protect privacy in the wake of the information age, however, faces similar criticisms. Here, it is argued that under the limits
of the Constitution, there is insufficient legal basis for the exercise of political author- ity to protect privacy. In
this sense, protective
legislation is seen as potentially overstepping the appropriate constitu- tional boundaries of political
authority and squelching free enterprise and innovation in the information age. Though it seems to be at the
other end of the spectrum, the question of whether the Constitution allows for the power of government to adopt and enforce laws to protect
private information from intrusion by the private sector is not unlike the question of whether the events of Septem- ber 11 justify increased
intelligence gathering and surveil- lance. Each is a question of enhanced political authority and its relationship to the liberty interests of privacy.
Yet, the answer is not so easily discerned from either constitu- tional doctrine or public sentiments.
Rather, the public policy debate must account for the interplay between each, because one is not
separate from the other. Interestingly, the war on terror coincides with the ac- celeration of the information age and, as a result,
affects the direction of policy debates regarding each. Perhaps the war on terror seems less intrusive and less
threatening to our privacy because our notions of privacy have been al- tered in an unprecedented
age of information. Surveillance is becoming commonplace, frequent, and innocuous. More- over, the
information age has altered the traditional physi- cal divide between the public and the private with the age of the Interet and other
technologies. Physical locale is no longer the definitional quality of privacy, and, as a re- sult, the traditional demarcation of privacy is no longer
apt in either legal doctrine or societal perceptions. Similarly, the events of September 11 and the subsequent prominence of surveillance and
information gathering may have caused us to be overly sensitized to information sharing in both the government and private sectors. The
events of September 11 and the rise of the informa- tion age challenge the previous balance between political authority and liberty, but it does
not follow that a new bal- ance cannot be struck. Yet,
it is necessary to move the de- bate beyond its current
dichotomy, which tends to view the rise of technology and the information age as intruding on
privacy. The dichotomy is not helpful because it is im- possible to eliminate the specter of terrorism and turn back the clock on the
information age. Instead, each is a new factor to be weighed in the quest for a balance between liberty and
the exercise of political authority. For this, let us return to Mill. As Mill advocates, the balance is
secured by the guar- antee of certain immunities that cannot be violated by those holding political
authority. As a secondary check on po- litical authority, constitutional checks that are established by
the consent of the community are a necessary condition for the acts of governing power. Thus, as a point of
depar- ture, the proper course of policy development to protect privacy while fostering the appropriate exercise of politi- cal authority requires
us to turn to the necessary immuni- ties, which cannot be trammeled, and to the constitutional checks that must remain intact
Privacy Impacts: Totalitarianism
Violations of privacy are the basis for governmental totalitarianism- the German
Democratic Republic proves.
Ron Watson, Department of Political Science, Washington University., “The Ethics of Domestic Government Spying” March 2013¶
http://rewatson.wustl.edu/The%20Ethics%20of%20Domestic%20Government%20Spying.pdf
Although states can hardly do without spies if they wish to remain secure, there is, of¶ course, a darker, more sinister picture of government
spying. This darker picture is one of¶ the
government using spying to control every aspect of people's lives,
compelling them to¶ act and think only in ways sanctioned by the state. Nowhere is this picture
painted more¶ vividly than in Orwell's 1984. Winston, the protagonist, remarks:¶ There was of course no way of
knowing whether you were being watched at any¶ given moment. How often, or on what system, the
Thought Police plugged in on¶ any wire was guesswork. It was even conceivable that they watched
everybody¶ all the time . . . You had to live { did live, from habit that became instinct { in the¶
assumption that every sound you made was overheard, and, except in darkness,¶ every movement
scrutinized. (Orwell 2007, 3)¶ This darker picture of spying cannot be dismissed as unrealistic, merely a
dystopian night-¶ mare. States have often controlled and continue to control their citizens with
spying.¶ Nowhere was this kind of control more complete than in the German Democratic Republic ¶
(GDR) during the Cold War, however. Historian Hubertus Knabe summarizes the control¶ exacted by the GDR's secret
police (Stasi) as follows: \Precisely the hidden, but for every¶ citizen tangible omni-presence of the Stasi, damaged
the very basic conditions for individual¶ and societal creativity and development: sense of one's self,
trust, spontaneity." (Bruce¶ 2010, 12)
Violation of privacy leads to a totalitarian state
Daniel J. Solove. Associate professor of law at the George Washington University Law School."The
Digital Person: Technology And Privacy In The Information Age"New York: New York University
Press, 2004.
Orwell's Totalitarian World. Journalists, politicians, and jurists often describe the
problem created by databases with the
metaphor of Big Brother--the harrowing totalitarian government portrayed in George Orwell's 1984. Big Brother is an allknowing, constantly vigilant government that regulates every aspect of one's existence. In every corner are
posters of an enormous face, with "eyes [that] follow you about when you move" and the caption "BIG BROTHER IS WATCHING YOU." ¶ Big
Brother demands complete obedience from its citizens and controls all aspects of their lives. It constructs
the language, rewrites the history, purges its critics, indoctrinates the population, burns books, and obliterates all disagreeable relics from
the past. Big Brother's
goal is uniformity and complete discipline, and it attempts to police people to an
innermost thoughts. Any trace of individualism is quickly suffocated.¶ This
terrifying totalitarian state achieves its control by targeting the private life, employing various techniques of power to
eliminate any sense of privacy. Big Brother views solitude as dangerous. Its techniques of power are
predominantly methods of surveillance. Big Brother is constantly monitoring and spying; uniformed patrols linger on
street corners; helicopters hover in the skies, poised to peer into windows. The primary surveillance tool is a device
unrelenting degree--even their
called a "telescreen" which is installed into each house and apartment. The telescreen is a bilateral television--individuals can watch it, but it
also enables Big Brother to watch them.¶
Privacy needs to be protected in order to retain a balance of power between parties
DANIEL J. SOLOVE, 2002, Assistant Professor, Seton Hall Law School, DIGITAL DOSSIERS AND THE DISSIPATION OF FOURTH
AMENDMENT PRIVACY, http://www-bcf.usc.edu/~usclrev/pdf/075502.pdf
The dangers discussed above illustrate why privacy is integral to freedom in the modern state. Privacy
must be protected by
establishing an architecture of power. The word “architecture” emphasizes that the protection of privacy must be
achieved through establishing a particular social structure that distributes power in our various
relationships. Certain kinds of legal regulation can be readily analogized to architecture. Typically, we view architecture as the design of
buildings and edifices. Buildings structure the way people feel and interact; they form and shape human relationships.182 Neal Kumar Katyal
provides a fascinating account of how physical architecture—the way that neighborhoods and buildings are designed—can affect criminal
behavior.183 Law
resembles architecture in many respects, especially in the way that certain forms of
regulation affect social practices. If we think of law as creating a structure, we can better understand the different forms that
modern regulation must take to protect liberty in the modern state. We have freedom not simply because we have rights.
Our liberty is constructed by various regulatory structures that regulate the safety of the products we buy, the
conditions of the apartments we live in, the way that companies must interact with us, and the sanctity of the environment, among others. An
architecture of power protects a number of social practices of which privacy forms a significant part . It
protects privacy by providing a regulatory structure that shapes relationships and safeguards
individual liberties. At the center of my view is the fact that privacy is an aspect of social practices, which involve relationships with
other people and entities.184 The need for privacy emerges from within a society, from the various social relationships that people form with
each other, with private sector institutions, and with the government. We do not need privacy on a deserted island; rather, the
need for
privacy is engendered by the existence of society, from the fact that we must live together.
Relationships involve some balance of power between the parties. Power is not necessarily a zerosum good, where more power to one party necessarily means less to another. However, certain
configurations of power in these relationships have profound effects on the scope and extent of
freedom, democracy, equality, and other important values. In the modern world, we are increasingly finding ourselves
in a new type of relationship with public and private institutions. These relationships are different because our institutions are more
bureaucratic in nature. Bureaucracies
use more information and often exercise power over people through
the use of personal data. Collecting and using personal information are having an intensifying
influence on the effects of power in our social relationships. Therefore, protecting privacy is critical to
governing these relationships, and consequently, to regulating the tone and tenor of life in the
Information Age.
Privacy Impacts: Autonomy
In a world with spying we damage autonomy.
Ron Watson, Department of Political Science, Washington University., “The Ethics of Domestic Government Spying” March 2013¶
http://rewatson.wustl.edu/The%20Ethics%20of%20Domestic%20Government%20Spying.pdf
So widespread intuitions support the principle of just cause for DGS. Let us turn to the¶
consequentialist case for just cause. The sophisticated consequentialist, I suggested in the ¶
introduction, would endorse a simple set of principles for DGS. But which principles would¶ she
endorse? She obviously could not endorse a principle permitting all DGS, since the con-¶ sequences
would be dire. If government agents were always at liberty to spy, people could¶ not develop stable expectations about where, when, and by
whom they are being observed¶ without expending considerable resources on countermeasures, nor could they conceal their¶ personal
information. People's enjoyment of goods requiring even a modicum of privacy¶ would rapidly diminish. People's autonomy
would be
gravely threatened, since the pressures¶ to conform to social norms would be virtually unchecked. The
liberal democratic culture of¶ free thought, free speech, and free action would be stifled.¶ Further, the
bene ts of such a permissive policy would be minimal. Some grave harms¶ might be prevented. But
permitting all spying is more likely to lead to ineffective and even¶ harmful spying. Spying for political
gain and to protect bureaucratic turfs, for example,¶ would likely be rampant.
Privacy hinges on autonomy- it focuses on the control over limitations and
confidentiality
Casman Susanne, professor at UNLV “The Right to Privacy in Light of the Patriot Act and Social Contract Theory”, DoP: 5-1-2011 DoA:
7/15/13 http://digitalscholarship.unlv.edu Pg 17-18
It is differentiated from the total field by virtue of the fact the self is in ¶ some degree involved in excluding in some (or possibly all)
circumstances, some (or ¶ possibly all), other persons from knowledge of the person’s possession. (Bates, 1964). ¶ Ruth
Gavison’s
into three personal basic elements: Solitude: ¶ control over one’s interpersonal
interactions with other people, Confidentiality: control ¶ over other people’s access to information
about oneself, and Autonomy: control over ¶ what one does, i.e. freedom of will. (Boyle, 2003). ¶ What all
of these definitions have in agreement is that privacy is about control, ¶ the amount we wish to
divulge to those around us. They also have as part of their ¶ definition that privacy is both a moral and legal right.
There is a fundamental aspect to ¶ human nature that defines privacy as a basic component. We
assume that privacy is a ¶ moral right, rather than simply a constitutional or legal right. We assume that
decomposition of privacy
privacy is a 18¶ fundamental right, rather than a right that can be explicated in terms of other fundamental ¶ rights (e.g. life, liberty, or
property). (Alfino and Mayes, 2002). Privacy
is an elastic ¶ concept. The limited-access view proposes that privacy
represents control over unwanted ¶ access, or alternatively, the regulation of, limitations on, or
exemption from scrutiny, ¶ surveillance, or unwanted access. Privacy, as a whole or in part, represents
control over ¶ transactions between person (s) and other(s), the ultimate aim of which is to enhance ¶
autonomy and /or minimize vulnerability. (Margulis, 2005).
Privacy protects Autonomy and individuality.
Michael R. Curry, 1997, Department of Geography, University of California, “The Digital Individual and the Private Realm”, Annals of the
Association of American Geographers, http://www.jstor.org/stable/2564405
Yet a bit of reflection suggests the difficulty with all of these positions. The difficulty is, put- ting the matter simply, that the
private
realm performs important functions in the life of the individual and the group. It is in private that
people have the opportunity to become individu- als in the sense that we think of the term. People,
after all, become individuals in the public realm just by selectively making public certain things about
themselves. Whether this is a matter of being selective about one's religious or political views, work history, education, income, or complexion, the important point is this: in a complex society, people adjust their public identities in ways
that they believe best, and they develop those identities in more private settings.
Privacy Impacts: Autonomy (2/2)
Invasions of privacy causes loss of autonomy.
Ron Watson, Department of Political Science, Washington University., “The Ethics of Domestic Government Spying” March 2013¶
http://rewatson.wustl.edu/The%20Ethics%20of%20Domestic%20Government%20Spying.pdf
This line of argument is supported by a further set of responses that people
might have¶ to learning how their
government regulates domestic spying. When principles unfairly or¶ unequally target certain groups,
they can demean, humiliate, and disrespect members of¶ those groups when they become public.
Principles can also have these e ects if they signal¶ to people their chosen pursuits are unworthy,
shameful, or depraved. People's self-respect¶ often depends on the existence of spaces for action free
from government intrusion. Further,¶ when citizens worry that they are under covert observation by
their government, there are a¶ range of activities that can become less enjoyable because they are
less private. Finally, when¶ citizens suspect that the government spies on them, they may lose trust in their government¶ and its
institutions
Privacy is needed in order to retain autonomy
DANIEL J. SOLOVE, 2002, Assistant Professor, Seton Hall Law School, DIGITAL DOSSIERS AND THE DISSIPATION OF FOURTH
AMENDMENT PRIVACY, http://www-bcf.usc.edu/~usclrev/pdf/075502.pdf
government information-gathering can severely constrain democracy and individual selfdetermination. Paul Schwartz illustrates this with his theory of “constitutive privacy.”99 According to Schwartz, privacy is essential
to both individuals and communities: “[C]onstitutive privacy seeks to create boundaries about
personal information to help the individual and define terms of life within the community.”100 As a form
of regulation of information flow, privacy shapes “the extent to which certain actions or expressions of identity
are encouraged or discouraged.”101 Schwartz contends that extensive government oversight over an
individual’s activities can “corrupt individual decision making about the elements of one’s identity.”
Further, inadequate protection of privacy threatens deliberative democracy by inhibiting people from
engaging in democratic activities. This can occur unintentionally; even if government entities are not
attempting to engage in social control, their activities can have collateral effects that harm democracy
and self-determination.
Privacy Impacts: Normalization
Invasions of privacy causes a normalizing effect on society.
Ron Watson, Department of Political Science, Washington University., “The Ethics of Domestic Government Spying” March 2013¶
http://rewatson.wustl.edu/The%20Ethics%20of%20Domestic%20Government%20Spying.pdf
Notice that the dragnet case could plausibly meet all of the four principles discussed¶ above. The problem with cases like Dragnet is that
ordinary people reasonably fear abuse¶ when their personal information is collected in droves; they
also worry that their harmless¶ counter-normative activities will be exposed, punished, or leveraged
against them. They¶ want law enforcement oficials and intelligence agents to possess thick les on
suspected terrorists and criminals, but they worry about these same government agents having
dossiers on¶ law abiding citizens. The temptations to misuse information for prudential or political
gain,¶ they think, are too high. So too are the temptations to police norms prohibiting harmless or¶ even beneficial behavior.
Indeed, the more innocents believe that the government possesses¶ detailed dossiers on them, the more
likely they will be to self-censor, especially when the¶ conduct challenges the government or its
officials. Principles that permit operations like¶ Dragnet, then, are not strategic, since they discourage
people from engaging in a range of¶ harmless or beneficial behaviors. They further risk humiliating or
disrespecting those who¶ engage in harmless but counternormative activities, fomenting paranoia,
undermining trust¶ in the government, and diminishing people's enjoyment of a range of private activities.
Electronic Surveillance
Electronic surveillance is inconsistent with a free society
ACLU.A nonpartisan non-profit organization whose stated mission is "to defend and preserve the
individual rights.March 1, 1998."Electronic surveillance is inconsistent with a free society."American Civil
Liberties Union.http://www.aclu.org/technology-and-liberty/big-brother-wires-wiretapping-digital-age.
Date Retrieved: July 7, 2013.
The cryptography debate offers the nation an opportunity to confront the issue of electronic surveillance anew. If we do not do so in a
fully informed and careful way, there will be no limit to the sweep of new technological opportunities
for total surveillance potential. Without the right to strong, non-key recovery encryption, the black strips on the backs of our credit,
cash and identity cards, the electronic keys being distributed by gasoline companies to enable the purchase of gas with the wave of a wand, the
E-Z passes for paying tolls electronically, and the imminent arrival of compact digital cell phones that also function as computers, e-mailers and
pagers, will all be vulnerable to both governmental and nongovernmental spying, both authorized and unauthorized. The American Civil
Liberties Union has historically opposed all forms of electronic surveillance by the government, and therefore supports the free and unfettered
development, production and distribution of the strongest possible encryption technology.
Electronic surveillance, whether
through bugging devices, wiretaps, or ready access to encryption keys, is fundamentally at odds with
personal privacy. It is the worst sort of general search, which necessarily captures not only the
communications of its specific targets, but those of countless others who happen to come in contact
with the targets or use the same lines. Free citizens must have the ability to conduct direct,
instantaneous, spontaneous and private communication using whatever technology is available.
Without the knowledge and assurance that private communications are, indeed, private, habits based
upon fear and insecurity will gradually replace habits of freedom. The right to privacy has already been severely
compromised in this country. Telephones have been tapped by police at least since 1895, and in the past
century there has been a constant tug of war between the government's impulse to eavesdrop and
the public's desire to resist further encroachments. Although its powers have been limited by both statute and court
decision, for all practical purposes the government has prevailed in this struggle. According to statistics compiled
by the Administrative Office of the U.S. Courts, surreptitious government surveillance is now at record levels.5 From 1985 to 1995, more than
12 million conversations were intercepted through law enforcement wiretaps, and all but a relative handful were completely innocent (in 1995
alone, nearly two million innocent conversations were intercepted). Although
government agents must obtain a warrant,
their requests for wiretaps are almost never turned down by judges or magistrates. In fact, only one
request by law enforcement for an intercept has been rejected in the last eight years. As will be explained
below, all of this wiretapping has produced little in the way of results for law enforcement and yet the expansive surveillance capabilities being
sought today through the control of encryption and digital telephony will give the government unprecedented access to all communications -with or without a warrant.
Browser Fingerprinting
Browser fingerprinting infringes on digital privacy
Larkin, Erik. Mar 26, 2010. Browser Fingerprints: A Big Privacy Threat.
http://www.pcworld.com/article/192648/browser_fingerprints.html
Forget cookies--even the ultrasneaky, Flash-based "super cookies." A new type of tracking may
identify you far more accurately than any cookie--and you may never know it was there.¶ The method
pulls together innocuous data about your browser, such as plug-ins, system fonts, and your operating
system. Alone, they don't identify you. Together, they're a digital fingerprint. ¶ It's like describing a person. Just saying "brown hair"
won't identify anyone. But add in "5 feet, 10 inches tall," "chipped right front tooth," "size 12 shoes," and so on, and soon you have enough information to pull someone out of a crowd, even without their name, Social Security
number, or any other of the usual identifiers.¶ Test your browser for unique identifiers without the risk: The Electronic Frontier Foundation, a privacy advocacy group, has set up an interesting online experiment at
Panopticlick.eff.org. Panopticlick gathers little details about your browser and computer, mostly using Javascript. In my case, the information it gathered about my browser was enough to uniquely identify my surfing software out
of more than 650,000 visitors. Peter Eckersley, a staff technologist with the EFF, says he and his colleagues de--cided to create the site when he heard rumors about this kind of tracking. He wanted to see how accurate it might
. Browser fingerprinting was developed for banks to employ to
prevent fraud. But now one company, Scout Analytics, offers it as a service to Web sites, and it
collects not just browser data but also data about how you type--things like your typing speed and
typing patterns.¶ This biometric signature, like the identifiers collected from the browser and the
computer, can be gathered using JavaScript alone, making this form of tracking hard to block. Matt Shanahan,
be.¶ Well, it's pretty accurate. And as it turns out, its use is more than a rumor ¶
senior vice president of strategy at Scout Analytics, says that the company sells its service primarily to paid subscription sites, such as those offering real estate listings, and that it is keen to expand into marketing and advertising by
helping sites track visitors in a way that, as he notes, is more accurate than using cookies. (Cookies can be deleted, which makes a repeat visit look like a new.
Collecting Information
There are wide sweeping programs to collect our information; this is a violation of
privacy in a new technological age.
Daniel J. Solove. Associate professor of law at the George Washington University Law School."The
Digital Person: Technology And Privacy In The Information Age"New York: New York University Press,
2004.
The government has recently been exploring ways to develop technology to detect patterns of behavior based
on dossiers. In 2002, it was revealed that the Department of Defense was developing a program called Total Information Awareness
(since renamed Terrorism Information Awareness). The program begins with the government amassing
personal information from private-sector sources into a massive database of dossiers on individuals.
Profiling technology is then used to detect those who are likely to be engaged ¶ in criminal activity. When
Congress learned of Total Information Awareness, it halted the program because of its threat to privacy. However, the same
type of collection and use of data envisioned by those who dreamed up Total Information Awareness is already being
carried out by the government. The digital dossiers that continue to grow in the private sector and in
public records are now becoming a tool for the government to monitor and investigate people. The
Secret Paradigm. In another way of understanding privacy that I refer to as the "secrecy paradigm," privacy is invaded by
uncovering one's hidden world, by surveillance, and by the disclosure of concealed information. The
harm such invasions cause consists of inhibition, self-censorship, embarrassment, and damage to one's reputation. The law is heavily influenced
by this paradigm. As
a result, if the information isn't secret, then courts often conclude that the
information can't be private. However, this conception of privacy is not responsive to life in the
modern Information Age, where most personal information exists in the record systems of hundreds of
entities. Life today is fueled by information, and it is virtually impossible to live as an Information Age ghost,
leaving no trail or residue. ¶ The Invasion Conception. Under the traditional view, privacy is violated by the invasive actions of
particular wrongdoers who cause direct injury to victims. Victims experience embarrassment, mental distress, or harm to their reputations. The
law responds when a person's deepest secrets are exposed, reputation is tarnished, or home is invaded. This view, which I call the "invasion
conception," understands privacy to be a kind of invasion in which somebody invades and somebody is invaded. However, digital
dossiers
often do not result in any overt invasion. People frequently don't experience any direct injury when
data about them is aggregated or transferred form one company to another. Moreover, many of the problems of
digital dossiers emerge from the collaboration of a multitude of different actors with different purposes. Each step along the way is
relatively small and innocuous, failing to cause harm that the invasion conception would recognize as
substantial.
A2: “We Consent to Surveillance”
Even giving consent to surveillance doesn’t solve the violation, you don’t know when
where or how they will spy on you.
Ron Watson, Department of Political Science, Washington University., “The Ethics of Domestic Government Spying” March 2013¶
http://rewatson.wustl.edu/The%20Ethics%20of%20Domestic%20Government%20Spying.pdf
The conclusion that we cannot assent to being spied upon might strike some as counterintuitive,
however. They might point to cases in which someone agrees in advance to¶ be spied on, but the
agreement does not specify when, where, or how the spying will take¶ place, thereby leaving open
the possibility that the spy can in particular instances conceal¶ her observation from her target.
Suppose, for example, a homeowner in crime ridden¶ neighborhood consents to being spied on by his
local police department. One can, he agrees,¶ can observe him and his property and conceal this fact
from him and others. This case and¶ others like it suggest that one can assent to be spied upon.
Autonomy
Necessary for Morality
Autonomy is necessary for morality, autonomy gives us the power to self determine
morals
Daniel Callahan, Senior Research Scholar and President Emeritus of the Center, Senior Lecturer at the Harvard Medical School and is now
a Senior Scholar at Yale. He received his B.A. from Yale and a Ph.D in philosophy from Harvard. 10/1986, A Moral Good, Not a Moral
Obsession, The Hastings Center, Vol. 14, No. 5, Autonomy, Paternalism, and Community, Date Accessed- 7/21/2013
A major attraction of the concept of autonomy is that it helps to establish moral independence. Not
only does it entail that, as an individual, I am to be treated by others as a moral end rather than a
moral means, it also requires that they allow me to pursue my own moral goods. Autonomy can
thus be understood as the basis for moral enfranchisement, establishing my standing as an equal in
the community and my liberty to pursue my own ends. In the context of medicine, it is a value that has served to
establish the rights of patients over physicians, and the right to be spared the paternalistic interventions of those who think they understand
my welfare better than I do. The
purpose of autonomy is to make me my own moral master. But if autonomy
may serve me in some fundamental ways, what would it be like to live in a community for which
autonomy was the central value? What kind of a medical practice might emerge with patient autonomy as the sole goal? Let me
try to answer that question by first reviewing some of the benefits of giving moral priority to autonomy. Among them are a
recognition of the rights of individuals and of their personal dignity; the erection of a powerful
bulwark against moral and political despotism; a becoming humility about the sources or certainty
of moral claims and demands; and a foundation for the protection of unpopular people and causes
against majoritarian domination. Those are powerful benefits, to be meddled with only at our peril. Nonetheless, I believe that
if autonomy is made the moral goal of a society, or of medical care within that society, then we are equally at
peril in our common life together.
Autonomy-Protects Free Speech
Autonomy recognizes and preserves free speech.
Daniel J. Solove, 2003, Associate Professor, Seton Hall Law School, The Virtues of Knowing Less: Justifying Privacy Protections against
Disclosure, Duke Law Journal, http://www.jstor.org/stable/1373222
One of the most frequently articulated rationales for the value of free speech is that it promotes
individual autonomy.94 As one commentator observes, the "value of free expression..,. rests on its deep relation
to self-respect arising from autonomous self-determination."95 The disclosure of personal information about others
certainly falls within the autonomy of the speaker. Respect for autonomy requires recognition of strong rights of selfexpression. Disclosure protections thus impair the autonomy of speakers who desire to speak about
others. Additionally, free speech can be justified in terms of the autonomy of the listener.96 Under this
view, free speech protects people's freedom of information consumption. Disclosure protections
prevent people from hearing information that they want to know.
Autonomy-Individual
Autonomy is to be preferred in an individual sense, societal autonomy goals are
problematic
Daniel Callahan, Senior Research Scholar and President Emeritus of the Center, Senior Lecturer at the Harvard Medical School and is now
a Senior Scholar at Yale. He received his B.A. from Yale and a Ph.D in philosophy from Harvard. 10/1986, A Moral Good, Not a Moral
Obsession, The Hastings Center, Vol. 14, No. 5, Autonomy, Paternalism, and Community, Date Accessed- 7/21/2013
If we ask what system of values might be best for our individual welfare and desires, then autonomy
is a prime candidate. But if we ask what system of values might be best for our life in community, for
sustaining a viable society and culture, then autonomy may fare less well. We need to give some thought to that
latter question. Yet, in doing so, we may well grant that the notion of autonomy, especially patient autonomy, has hardly become triumphant
in the daily life of medicine; in fact, it is probably still more curtailed or denied than honored. We may also grant the powerful tendency of
technological medicine to dehumanize and depersonalize, to efface or erase individuality, to attend to our organs and parts rather than our
persons. Nor need we deny that, faced with budget pressures and cuts, individual welfare and freedom of choice are likely to be the first
victims. In short, it
may seem churlish or precious to question the value of autonomy in a medical system that only
precisely because autonomy has so often been
held up as the value of the future, the ideal yet to be achieved, it is well to ask what that future might
look like. The trouble with wanting one's dreams to come true is that they may come true.
yesterday first heard of the idea and even today tends to neglect it. Yet
Autonomy-Consent Necessary for Morality
Moral obligations can only be self accepted
Daniel Callahan, Senior Research Scholar and President Emeritus of the Center, Senior Lecturer at the Harvard Medical School and is now
a Senior Scholar at Yale. He received his B.A. from Yale and a Ph.D in philosophy from Harvard. 10/1986, A Moral Good, Not a Moral
Obsession, The Hastings Center, Vol. 14, No. 5, Autonomy, Paternalism, and Community, Date Accessed- 7/21/2013
Let us¶ grant that others should honor my¶ autonomy and that I should honor theirs.¶ Yet if I should
have (or believe I have)¶ moral¶ obligations toward others, could I be¶ relieved of them¶ by their
declaration of au-¶ tonomy in the face of my obligations? If,¶ for example, a physician believes that he¶
or she has an obligation to save the life of¶ another, but that person wants to die, is¶ that¶ obligation
nullified or overridden by¶ the¶ patient's declaration? The common autonomy doctrine would say it is. For if
patients are to be their own moral¶ agents,¶ choosing their own moral good, then no¶ one, it would
seem, could have moral obligations to them that they did not choose to¶ allow. If that is the case, we are still
left¶ with a troubling puzzle. Are we to under-¶ stand that the physician's obligation vanishes once autonomy has been declared, or¶ that it
continues to exist but has been over-¶ ridden by a higher value? If the former is¶ the case, the¶ obligation seems to have no¶ basis whatsoever;
if the latter is the case,¶ then the conscience of the¶ physician seems¶ a fragile, disposable matter.¶
There is no absolute morality, rather it is determined by ourselves with our autonomy.
Further, only a consenting agreement can create moral obligations outside of
respecting others autonomy.
Daniel Callahan, Senior Research Scholar and President Emeritus of the Center, Senior Lecturer at the Harvard Medical School and is now
a Senior Scholar at Yale. He received his B.A. from Yale and a Ph.D in philosophy from Harvard. 10/1986, A Moral Good, Not a Moral
Obsession, The Hastings Center, Vol. 14, No. 5, Autonomy, Paternalism, and Community, Date Accessed- 7/21/2013
If (to be reminded of Wittgenstein) we look not for the meaning of autonomy but for its social uses, what do
we see? 1. As moral agents, we are essentially independent of each other and isolated; we are not
social animals, but morally self-en- closed, self-encompassing animals. 2. There can be no moral
truth or wisdom about individual moral goods and goals and few if any about communal ends;
morality is inherently subjective and relativistic. 3. The ideal relationship among human beings is
the voluntary, contractual relationship of consenting adults; the community has no standing to say
what is good or bad in such relationships. 4. In any weighing of the relative interests of individual
and community, the bur- den of proof is always upon the community to prove its case for restricting
the liberty of individuals. 5. The only moral obligations I have toward others are those I voluntarily
under- take; there can be no such thing as an in- voluntary moral obligation. 6. The only moral
obligations that oth- ers have toward me are those that autonomously I allow them to have; all I am
owed by others is respect for my autonomy. 7. Respect for the autonomy of others is sufficient ground
for overriding my own conscience.
Moral obligations can must be agreed to by all other parties involved, if one disagrees,
they are an coercive attempt to violate their autonomy
Daniel Callahan, Senior Research Scholar and President Emeritus of the Center, Senior Lecturer at the Harvard Medical School and is now
a Senior Scholar at Yale. He received his B.A. from Yale and a Ph.D in philosophy from Harvard. 10/1986, A Moral Good, Not a Moral
Obsession, The Hastings Center, Vol. 14, No. 5, Autonomy, Paternalism, and Community, Date Accessed- 7/21/2013
To¶ go one step further, does a respect for autonomy mean that we are not allowed to¶ imagine a good for others beyond that¶ which¶ they
imagine for themselves? Or¶ that we are not allowed to¶ persuade others¶ that their autonomous moral choices are¶ wrong, or defective, or
less valuable than¶ they might be? Of course we are allowed¶ to do those¶ things. The
moral autonomy of¶ others does not
rule out noncoercive attempts to persuade them to think or act differently. What we cannot do is to
impose¶ our values, or the dictates of our con-¶ science, upon them against their will.¶ Does it then
follow that the¶ only moral¶ obligations we can owe to autonomous¶ moral agents are those¶ formally
agreed to¶ by them in some contractual manner? Apparently so. We can talk with them, exhort¶ them,
attempt to persuade them. What we¶ cannot do, under the¶ implicit mutual contract, is to go one step
beyond the contract,¶ however¶ powerful our sense of obligation¶ might be or however powerful our
alternative notions of what would serve the moral¶ interests of another. The very point of the¶ moral¶
autonomy of another is to empower¶ his or her¶ personal liberty and to restrict¶ that of others toward
him or her.¶ Only a¶ voluntary ceding or suspension of autonomy rights can change the nature of that¶
relationship with others.
A2: Prefer Justice
Autonomy supersedes justice- justice is based off of the idea of self preference
Daniel Callahan, Senior Research Scholar and President Emeritus of the Center, Senior Lecturer at the Harvard Medical School and is now
a Senior Scholar at Yale. He received his B.A. from Yale and a Ph.D in philosophy from Harvard. 10/1986, A Moral Good, Not a Moral
Obsession, The Hastings Center, Vol. 14, No. 5, Autonomy, Paternalism, and Community, Date Accessed- 7/21/2013
It is sometimes said that¶ justice is powerful¶ enough to supersede autonomy, and¶ it is true that most
theories of¶ justice allow¶ the¶ suppression or overriding of individual¶ liberty under some
circumstances. Yet the¶ most popular and influential¶ contemporary¶ theories of justice (at least in the
United¶ States) see the source of a theory of justice¶ in individual needs and¶ desires, and the¶
outcome of a¶ reign of justice as the enthronement of individual¶ autonomy. Justice becomes little
more than a¶way station¶ on the road to self-determination.¶
Equal Prioritization
Achieving a balance of national security objectives and digital privacy is necessary.
Giuseppe, Vaciago is a lecturer in IT Law at University of Milan, focusing his research on cybercrime
and computer forensics. 2013. “Privacy vs. Security? A Dilemma of the Digital Era¶ ”Freedom from Fear
magazine.”
http://www.freedomfromfearmagazine.org/index.php?option=com_content&view=article&id=314:priv
acy-vs-security-a-dilemma-of-the-digital-era&catid=50:issue-7&Itemid=187
First and foremost, there are no winners or losers in the efforts to strike a balance between personal
rights and public order and security, as these two following examples illustrate. On the one side, Europe adopted a
data retention policy necessitating clearer definitions of the types of offences in connection to which
stored personal data may be subjected to disclosure. On the other side, during the Bush
administration the National Security Agency struck a deal with the main national telecommunications
carriers to set up a database of the records of all the phone calls and online activities of American
citizens.¶ Secondly, the EU-US joint statement released in Washington on 28 October 2009, as well as the Stockholm Program of 2
December 2009, are and must be treated as urgent calls for the active implementation of the Cybercrime Convention. Without wishing to
belittle the importance of this Convention, however, it is clear that in an area such as Internet which connects the entire world,
Intergovernmental Organizations also need to intervene, endeavouring to include as many countries as possible. ¶ The third and last
conclusion is more of a hope: the huge potential of the Internet cannot be exploited merely to keep in touch
with old classmates or make free video calls to family and friends. It is precisely as a result of the global interconnectivity it offers, allowing
people from different countries and backgrounds to share information and exchange ideas, that the
Internet must serve as the
starting point for setting up a framework of rules that reconciles privacy protection with the public
interest in detecting, investigating and preventing crime both online and offline, in a manner
satisfactory to all. We managed to draw up the Universal Declaration of Human Rights without the
benefit of the Internet as a universal instrument of peace. Imagine what we can now do, with it.
Surveilance Ineffective-Terrorists
The US surveillance progams aren’t effective at stopping terrorists-they can’t gain
access to their covert communications.
Bershidsky, Leonid. Staff Editor. Jun 23, 2013. U.S. Surveillance Is Not Aimed at Terrorists.
http://www.bloomberg.com/news/2013-06-23/u-s-surveillance-is-not-aimed-at-terrorists.html.
Accessed 7/16/2013.
“People who radicalise under the influence of jihadist websites often go through a number of stages,” the Dutch
report said. “Their virtual activities increasingly shift to the invisible Web, their security awareness increases and their activities
become more conspiratorial.” ¶ Radicals who initially stand out on the “surface” Web quickly meet people, online or offline, who
drag them deeper into the Web underground. “For many, finally finding the jihadist core forums feels like a warm bath after
their virtual wanderings,” the report said. ¶ When information filters to the surface Web from the core forums, it’s
often by accident. Organizations such as al-Qaeda use the forums to distribute propaganda videos, which careless participants or their
friends might post on social networks or YouTube. ¶ Communication on the core forums is often encrypted. In 2012, a
French court found nuclear physicist Adlene Hicheur guilty of, among other things, conspiring to commit an act of terror for distributing and
using software called Asrar al-Mujahideen, or Mujahideen Secrets. The program employed various cutting-edge encryption methods, including
variable stealth ciphers and RSA 2,048-bit keys. ¶ The NSA’s Prism, according to a classified PowerPoint presentation published by the Guardian,
provides access to the systems of Microsoft Corp. (and therefore Skype), Facebook Inc., Google, Apple Inc. and other U.S. Internet giants. Either
these companies have provided “master keys” to decrypt their traffic - - which they deny -- or the NSA has somehow found other means. Even
complete access to these servers brings U.S. authorities no closer to the core forums . These must be
infiltrated by more traditional intelligence means, such as using agents posing as jihadists or by informants within terrorist
organizations. ¶ Similarly, monitoring phone calls is hardly the way to catch terrorists. They’re generally not
dumb enough to use Verizon. Granted, Russia’s special services managed to kill Chechen separatist leader Dzhokhar Dudayev with a
missile that homed in on his satellite-phone signal. That was in 1996. Modern-day terrorists are generally more aware of
the available technology. ¶ At best, the recent revelations concerning Prism and telephone surveillance might deter potential recruits
to terrorist causes from using the most visible parts of the Internet. Beyond that, the government’s efforts are much more
dangerous to civil liberties than they are to al-Qaeda and other organizations like it.
Digital Surveillance is ineffective at stopping terrorism
Bershidsky, Leonid. Staff Editor. Jun 23, 2013. U.S. Surveillance Is Not Aimed at Terrorists.
http://www.bloomberg.com/news/2013-06-23/u-s-surveillance-is-not-aimed-at-terrorists.html.
Accessed 7/16/2013.
The infrastructure set up by the National Security Agency, however, may only be good for gathering
information on the stupidest, lowest-ranking of terrorists. The Prism surveillance program focuses on
access to the servers of America’s largest Internet companies, which support such popular services as
Skype, Gmail and iCloud. These are not the services that truly dangerous elements typically use.
Hackers
Hackers Good-Anonymous
Anonymous is good for society because it keeps governments and agencies in check.
Ivanov, Georgi (MA, HBA in Political Science) Jan 2013 What is Anonymous? Everything You Ever
Wanted to Know About the Shadowy Internet Group. http://www.policymic.com/articles/23922/whatis-anonymous-everything-you-ever-wanted-to-know-about-the-shadowy-internet-group Date Accessed:
7/18/13
Understanding Anonymous begins with an overview of their history, beginning with 4chan, and evolving into a
movement whose primary tools of the trade became denial of service and hacking attacks,
accompanied by the public release of sensitive information, including the personal data of individuals
involved with the organization placed in the cross-hairs. The public arm of Anonymous consists of press releases and
videos that are as much information about its activities as they are about its principles, but also provide commentary on current events. The
group does act out against cases where miscarriage of justice or corruption is concerned, and these are
actions that, while controversial, have merit. While hacking attacks are done to symbolize opposition to
one issue or another, leaking information is a practice that predates Anonymous, but still remains a
potent tool in revealing how organizations and governments that would not otherwise release their
information, operate. The consequent fallout creates a public relations disaster for the affected parties,
but it is a reminder that society works best when there is a degree of accountability and trust
between governments and governed.
Encrypted communications are practically impossible to crack
Ou, Geore. 2006 (Network engineer. “Is encryption really crackable?”. 30 Apr. Accessed 17 July 13.
http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204)
The problem is compounded by the fact that much of the misinformation out there actually sounds somewhat believable and many people just
don't know what to believe. So to settle this once and for all, let's look at the facts. One of the things that make these myths plausible is the fact
that "128-bit" WEP encryption used in 802.11 Wireless LANs is so pathetically weak. The inside scoop is that WEP was designed during the late
90s during a time when USA export laws were extremely tight. Fearing 802.11 devices would be banned by US export laws, good encryption
algorithms were deliberately passed up by the 802.11 group in favor of a weaker one. The WEP algorithm was fundamentally flawed and the
802.11 standards body knew full well that it wasn't a strong encryption algorithm when they selected it. However, WEP's glaring weaknesses
are not characteristic of any properly implemented symmetric encryption algorithms used in SSL or VPN implementations. To give you an idea
of how good something like DES is, DES
is 30 years old and no one has found any weakness or shortcut for cracking it yet
though it can be brute forced. Brute force techniques are considered impractical because modern encryption
algorithms are 128 to 256 bits long.¶ Further propelling the myth that encryption is worthless is that I often hear people saying
that they heard that a 512 bit RSA key was broken. The truth of the matter is that 512 bit (and recently even 660 bit) RSA keys have been
broken by the University of Bonn in Germany but that is has absolutely nothing to do with the type of encryption that's used for ordinary bulk
encryption. Furthermore, RSA's inventors were well aware of the fact that it takes a much larger key to be secure which is why typical
implementations are at a minimum 768 bits and can easily go up to 2048 bits and beyond. To give you an idea what it takes to
break an
RSA 1620 bit key, you would need a computer with 120 Terabytes of memory before you can even
think about attempting it and the memory requirement virtually rules out massively distributed
cracking methods. Some may ask why use RSA keys when it's many orders of magnitude slower and requires so many more bits to be
secure, the reason is that RSA encryption has the special property of being able to do secure key exchanges in plain sight of an adversary who is
trying to break in but still remain safe. For this reason, RSA keys are strictly used for the initial phases of a secure communication session for the
purpose of Authentication (where one entity proves who they are) and for secure key exchanges (used for bulk symmetric encryption). Once
the initial transaction is complete, the key that was exchanged during the initial RSA phase can now be used for SSL or VPN bulk encryption with
algorithms like RC5, 3DES, or AES.¶ The last big factor in encryption myths and bit size inflation is salesmen and marketers because bigger
numbers always sound nicer. I've had salesmen come in to my office and try to tell me that RSA or AES encryption was worthless and that I
should be using their product which uses some kind of 1000 bit wonder-crypto solution. All it takes is one company to try and out do their
competitors and pitch their products using 4096-bit RSA and the next company will come along and pitch 16384-bit RSA keys in their product.
Many IT consultants will shy away from quoting smaller bit sizes because they're afraid to be out done by their competitors. ¶ Ah, but what
about the dreaded massively distributed cracking brute force method for attacking something like 128 bit RC5 encryption? There
are
massive zombie farms of infected computers throughout the world and some may have gotten as big as 1 million
infected computers. What if that entire army was unleashed upon the commonly used 128 bit RC5
encryption? Surprisingly, the answer is not much. For the sake of argument, let's say we unleash 4.3 billion computers
for the purpose of distributed cracking. This means that it would be 4.3 billion or 2 to the 32 times faster than a single
computer. This means we could simply take 2 to the 128 combinations for 128-bit encryption and divide
it by 2 to the 32 which means that 2 to the 96 bits are left. With 96 bits left, it's still 4.3 billion times
stronger than 64 bit encryption. 64 bit encryption happens to be the world record for the biggest RC5
bit key cracked in 2002 which took nearly 5 years to achieve for a massive distributed attack. ¶ Now that
we know that the distributed attacks will only shave off a few bits, what about Moore's law which historically meant that computers roughly
doubled in speed every 18 months? That means in 48 years we can shave another 32 bits off the encryption armor which means 5 trillion future
computers might get lucky in 5 years to find the key for RC5 128-bit encryption. But with 256-bit AES encryption, that moves the date out
another 192 years before computers are predicted to be fast enough to even attempt a massively distributed attack. To
give you an
idea how big 256 bits is, it's roughly equal to the number of atoms in the universe!¶ Once some of these basic
facts on encryption become clear, "is encryption crackable" isn't the right question because the real question is "when can it be cracked and will
it matter then". This is just like Bank safes which are rated by the time it takes an attacker to crack it open and never sold as "uncrackable".
Encryption strength and the number of bits used are selected based on how many decades the data needs to be kept safe. For a secure ECommerce transaction, the data being transmitted is moot after a few decades which is why 128-bit encryption is perfectly suitable since it's
considered unbreakable for the next few decades. For top secret classified data that needs to remain secret for the next 100 years, the
Government uses NIST certified 256-bit AES encryption. So
the next time someone tells you that encryption is
crackable, ask him if he'll be around on this earth to see it demonstrated.
Cyberattacks
A cyber attack would not be that severe and countries aren’t likely to launch them
against each other.
Lewis, James, author of over 90 papers since becoming director of the technology and public policy program at the center for
strategic and international studies. December of 2002.“Assessing the Risks of Cyber Terrorism, Cyber War, and Other Cyber
Threats” center for strategic and international studies, Washington DC and Steptoe
publications.http://www.steptoe.com/publications/231a.pdf Date Accessed: July 16, 2013
Cyber crime is a serious and growing threat, but the risk to a nation-state in deploying cyber-weapons
against a potential opponent’s economy are probably too great for any country to contemplate these
measures. For example, writers in some of China’s military journals speculated that cyber attacks could
disable American financial markets. The dilemma for this kind of attack is that China is as dependent on the
same financial markets as the United States, and could suffer even more from disruption. With other
critical infrastructures, the amount of damage that can be done is, from a strategic viewpoint, trivial,
while the costs of discovery for a nation state could be very great. These constraints, however, do not apply to
non-state actors like Al Qaeda. Cyber attacks could potentially be a useful tool (albeit not a fatal or
determinative tool) for nonstate actors who reject the global market economy
Tech Bad
Technopoly creates an endless cycle of dependence, sickening the psyche of the
dependent
Postman, Neil. Technopoly: The Surrender of Culture to Technology, New York, Vintage Books, pp. 71-72. 1992
http://www.ibiblio.org/cmc/mag/1995/mar/hyper/npcontexts_119.html Date accessed- 7/16/13
Technopoly is a state of culture. It is also a state of mind. It consists in the deificaiton of technology,
which means that the culture seeks its authorization in technology, finds its satisfactions in
technology, and takes its orders from technology. This requires the development of a new kind of
social order, and of necessity leads to the rapid dissolution of much that is associated with traditional
beliefs. Those who feel most comfortable in Technopoly are those who are convinced that technical
progress is humanity's superhuman achievement and the instrument by which our most profound
dilemmas may be solved. They also believe that information is an unmixed blessing, which through its
continued and uncontrolled production and dissemination offers increased freedom, creativity, and
peace of mind. The fact that information does none of these things -- but quite the opposite -- seems to change
few opinions, for unwavering beliefs are an inevitable product of the structure of Technopoly. In
particular, Technopoly flourishes when the defenses against information break down. ¶ The
relationship between information and the mechanisms for its control is fairly simple to describe:
Technology increases the available supply of information. As the supply is increased, control
mechanisms are strained. Additional control mechanisms are needed to cope with new information.
When additional control mechanisms are themselves technical, they in turn further increase the
supply of information. When the supply of information is no longer controllable, a general breakdown
in psychic tranquillity and social purpose occurs. Without defenses, people have no way of finding
meaning in their experiences, lose their capacity to remember, and have difficulty imagining
reasonable futures. ¶ One way of defining Technopoly, then, is to say it is what happens to society
when the defenses against information glut have broken down. It is what happens when institutional
life becomes inadequate to cope with too much information. It is what happens when a culture,
overcome by information generated by technology, tries to employ technology itself as a means of
providing clear direction and humane purpose. The effort is mostly doomed to failure. Though it is
sometimes possible to use a disease as a cure for itself, this occurs only when we are fully aware of
the processes by which disease is normally held in check. My purpose here is to describe the defenses that in principle are
available and to suggest how they have become dysfunctional.
Computers and technology create a shield of ignorance to the real threats by hiding it
behind the need for technological advancement and speed.
Postman, Neil. Technopoly: The Surrender of Culture to Technology, New York, Vintage Books, pp. 118-20. 1992
http://www.ibiblio.org/cmc/mag/1995/mar/hyper/npcontexts_119.html Date accessed- 7/16/13
Because of what computers
commonly do, they place an inordinate emphasis on the technical processes of
communications and offer very little in the way of substance. With the exception of the electric light, there never has
been a technology that better exemplifies Marshall McLuhan's aphorism "The medium is the message." The computer is almost all
process. There are, for example, no "great computerers," as there are great writers, painters, or musicians. [I can't resist interjecting here:
there are no great "pencilers" or "brushers" either. What is this guy thinking?] There are "great programs" and "great programmers," but their
greatness lies in their ingenuity either in simulating a human function or in creating new possibilities of calculation, speed, and volume. Of
course, if J. David Bolter is right, it
is possible that in the future computers will emerge as a new kind of book,
expanding and enriching the tradition of writing technologies. Since printing created new forms of literature when it
replaced the handwritten manuscript, it is possible that electronic writing will do the same. But for the moment, computer technology
functions more as a new mode of transportation than a as new means of substantive communication.
It moves information -- lots of it, fast, and mostly in calculating mode. The computer, in fact, makes possible the fulfillment of Descartes' dream
of the mathematization of the world. Computers make it easy to convert facts into statistics and to translate problems into equations. And
whereas this can be useful (as when the process reveals a pattern that would otherwise go unnoticed), it is diversionary and
dangerous when applied indiscriminately to human affairs. So is the computer's emphasis on speed and especially its
capacity to generate and store unprecedented quantities of information. In specialized contexts, the value of calculation, speed, and
voluminous information may go uncontested.
But the "message" of computer technology is comprehensive and
domineering. The computer argues, to put it baldly, that the most serious problems confronting us at both
personal and professional levels require technical solutions through fast access to information
otherwise unavailable. I would argue that this is, on the face of it, nonsense. Our most serious problems are not
technical, nor do they arise from inadequate information. If a nuclear catastrophe occurs, it shall not
be because of inadequate information. Where people are dying of starvation, it does not occur
because of inadequate information. If families break up, children are mistreated, crime terrorizes a
city, education is impotent, it does not happen because of inadequate information. Mathematical equations,
instantaneous communication, and vast quantities of information have nothing whatever to do with any of these problems. And the computer
is useless in addressing them.
Tech pollutes the traditional sense of learning calling into question true learning.
Postman, Neil. Technopoly: The Surrender of Culture to Technology, New York, Vintage Books, pp. 16-19. 1992
http://www.ibiblio.org/cmc/mag/1995/mar/hyper/npcontexts_119.html Date accessed- 7/16/13
We can imagine that Thamus would also have pointed out to Gutenberg, as he did to Theuth, that the
new invention would create a vast population of readers who "will receive a quantity of information
without proper instruction...[who will be filled] will the conceit of wisdom instead of real wisdom"; that
reading, in other words, will compete with older forms of learning. This is yet another principle of technological change we may infer from the
judgment of Thamus:
new technologies compete with old ones -- for time, for attention, for money, for
prestige, but mostly for dominance of their world-view. This competition is implicit once we
acknowledge that the medium contains an ideological bias. And it is a fierce competition, as only
ideological competitions can be. It is not merely a matter of tool against tool -- the alphabet attacking ideographic writing, the
printing press attacking the illuminated manuscript, the photograph attacking the art of painting, television attacking the printed word. When
media make war against each other, it is a case of world-views in collision. In
the United States, we can see such collisions
everywhere -- in politics, in religion, in commerce -- but we see them most clearly in the schools,
where two great technologies confront each other in uncompromising aspect for the control of
students' minds. On the one hand, there is the world of the printed word with its emphasis on logic, sequence, history,
exposition, objectivity, detachment, and discipline. On the other there is the world of television with
its emphasis on imagery, narrative, presentness, simultaneity, intimacy, immediate gratification, and
quick emotional response. Children come to school having been deeply conditioned by the biases of
television. There, they encounter the world of the printed word. A sort of psychic battle takes place,
and there are many casualties -- children who can't learn to read or won't, children who cannot
organize their thought into logical structure even in a simple paragraph, children who cannot attend
to lectures or oral explanations for more than a few minutes at a time. They are failures, but not because they are
stupid. They are failures because there is a media war going on, and they are on the wrong side -- at least
for the moment. Who knows what schools will be like twenty-five years from now? Or fifty? In time, the type of student who is
currently a failure may be considered a success. They type who is now successful may be regarded as
a handicapped learner -- slow to respond, far too detached, lacking in emotion, inadequate in creating mental pictures of reality.
Consider: what Thamus called the "conceit of wisdom" -- the unreal knowledge acquired through the written word -- eventually became the
pre-eminent form of knowledge valued by the schools. There
is no reason to suppose that such a form of knowledge
must always remain so highly valued. To take another example: In introducing the personal computer to the
classroom, we shall be breaking a four-hundred year-old truce between the gregariousness and
openness fostered by orality and the introspection and isolation fostered by the printed word. Orality
stresses group learning, cooperation, and a sense of social responsibility.... Print stresses
individualized learning, competition, and personal autonomy. Over four centuries, teachers, while emphasizing print,
have allowed orality its place in the classroom, and have therefore achieved a kind of pedagogical peace between these two forms of learning,
so that what is valuable in each can be maximized. Now
comes the computer, carrying anew the banner of private
learning and individual problem-solving. Will the widespread use of computers in the classroom
defeat once and for all the claims of communal speech? Will the computer raise egocentrism to the
status of a virtue? These are the kinds of questions that technological change brings to mind when one
grasps ... that technological competition ignites total war, which means it is not possible to contain
the effects of a new technology to a limited sphere of human activity.... What we need to consider
about the computer has nothing to do with its efficiency as a teaching tool. We need to know in what
ways it is altering our conception of learning, and how, in conjunction with television, it undermines
the old idea of school.
WikiLeaks
A2: Threatens US Diplomacy
Wikileaks is not a threat to National Security, Diplomacy between nations will still
continue.
Helller, Kevin J. (Associate Professor at the University of Melbourne) Dec 2010 Why the Benefits of
WikiLeaks Far Outweigh Its Dangers http://opiniojuris.org/2010/12/03/why-wikileaks-good-faroutweighs-its-harm/ Date Accessed: 7/18/13
I have no doubt that some diplomats may respond to WikiLeaks’ disclosures by self-censoring and by
avoiding written communications. But it is difficult to believe that WikiLeaks will have any significant or
lasting effect on the US’s ability to engage in diplomacy with friendly or unfriendly governments; after
all, this is hardly the first time in U.S. history that diplomatic secrets have been disclosed. Robert Gates, the Secretary of
Defense, said it best a couple of days ago: Let me just offer some perspective as somebody who’s been at this a long
time. Every other government in the world knows the United States government leaks like a sieve , and it
has for a long time. And I dragged this up the other day when I was looking at some of these prospective releases. And this is a quote from John
Adams: ‘How can a government go on, publishing all of their negotiations with foreign nations, I know not. To me, it appears as dangerous and
pernicious as it is novel.’ Now, I’ve
heard the impact of these releases on our foreign policy described as a
meltdown, as a game-changer, and so on. I think those descriptions are fairly significantly
overwrought. The fact is, governments deal with the United States because it’s in their interest, not
because they like us, not because they trust us, and not because they believe we can keep secrets . Many
governments — some governments — deal with us because they fear us, some because they respect us, most
because they need us. We are still essentially, as has been said before, the indispensable nation. So other
nations will continue to deal with us. They will continue to work with us. We will continue to share
sensitive information with one another. Is this embarrassing? Yes. Is it awkward? Yes. Consequences for U.S.
foreign policy? I think fairly modest.
Meta-Ethics
Naturalism
Acting in accordance with natural facts is the meta-ethic for the round, and as such all
moral argumentation must be consistent with it. Moreover, naturalism best responds
to moral claims.
Papineau [Papineau, David, (Professor of Philosophy of Science at King's College) "Naturalism", (The Stanford Encyclopedia of
Philosophy)]
Realist moral
naturalism also seems better off than non-naturalist realism in two further respects. The first relates to
is hard to see how non-natural moral facts could have any motivating
force: after all, if such facts are incapable of having effects of any kind, they will a fortiori be incapable
of motivating human beings. True, moral motivation is not a straightforward matter for naturalist moral realists either: if moral facts
the motivating force of moral facts. It
are natural, then won't it be possible for someone to recognize their existence, yet not be correspondingly moved to action in any way?
However, there are various responses naturalist realists can make to this challenge. (Ridge 2006 Section 5, Lenman 2006 Section 2.) The other
point on which naturalist moral realists seem better placed than non-naturalists has to do with [in] explaining the supervenience of moral facts
on other facts. As
noted earlier, intuition seems to demands that two situations that are identical with
respect to physical properties will also be morally identical. For naturalists, this will follow from
general naturalist principles. Non-naturalists, by contrast, would seem to lack any obvious
explanation of why moral facts should so supervene on physical facts
Naturalism best responds to moral claims
Papineau [Papineau, David, (Professor of Philosophy of Science at King's College) "Naturalism", (The Stanford Encyclopedia of
Philosophy)]
Realist moral naturalism also seems better off than non-naturalist realism in two further respects. The first relates
to the motivating force of moral facts. It is hard to see how non-natural moral facts could have any motivating
force: after all, if such facts are incapable of having effects of any kind, they will a fortiori be incapable of
motivating human beings. True, moral motivation is not a straightforward matter for naturalist moral realists either: if moral facts are
natural, then won't it be possible for someone to recognize their existence, yet not be correspondingly moved to action in any way? However,
there are various responses naturalist realists can make to this challenge. (Ridge 2006 Section 5, Lenman 2006 Section 2.) The other point on
which naturalist moral realists seem better placed than non-naturalists has to do with [in] explaining the supervenience of moral facts on other
facts. As noted earlier, intuition
seems to demands that two situations that are identical with respect to
physical properties will also be morally identical. For naturalists, this will follow from general
naturalist principles. Non-naturalists, by contrast, would seem to lack any obvious explanation of why
moral facts should so supervene on physical facts
Heredity play a major role in our decision and moral actions as people based on how it
effects our environment.
Fontanilla Conrado , Staff analist, 8/26/12, Does Heredity Influence How Our Life Would Be?
http://conradofontanilla.hubpages.com/hub/Does-Genetics-Influence-Our-Life-Would-Be
It is difficult to separate the effect of heredity or genetics from that of environment. But let's assume
that that can be done. A person may have the genes to enable him to grow 6 ft tall but due to poverty
and inadequacy of food he grew only to 5.5 ft tall. The food is part of his environment. Other parts of his
environment are: relationship with parents, brothers or sisters if he has any, classmates, members of his congregation. He learns moral values
from them.¶ The phrase "would be" in the question pertains to moral values. A crocodile eats any smaller animal in its pond thus he dominates
the pond. Let's say it does not care whether its diet suffers of not. The crocodile is amoral. A man/woman may be imbued with moral values. He
knows what is good or bad according to his/her environment. His/her
genetics affect his/her capacity to learn and to
adapt to his/her environment. But his/her morals guide him/her what s/he "would be." His/her
genetics makes him/her what s/he "is." His/her environment makes him/her what s/he "would be."¶
For example, Einstein, derived from his genetic make up, had the capacity to come up with the formula E = mc2.. During World War II he feared
that Hitler's Germany might have used this formula to develop a powerful bomb as demonstrated by the V-2 rockets that Germany used to
bomb London in 1944. He wrote a letter to President Franklin D. Roosevelt of the U.S. and urged him to develop a bomb for use in retaliation
against Hitler's Germany in case it unleashed an atomic bomb.¶ Then the atomic bombs developed by the U.S were dropped over Nagasaki and
Hirosima killing thousands of Japanese civilians (not combatant soldiers) on the spot and maiming several others for life. Einstein was horrified.
He said that had he known that the atomic bomb would be used on civilians he would not have urged President Roosevelt to make them
(Einstein, A. Ideas and Opinions. 1954).¶ There is duality in man/woman. One part biological; the other moral. ¶ His/her
genetics
enables him to adapt to the environment. S/he is incapable of making his/her own food, unlike plants.
So s/he must eat plants to live. To live is part of "would be." That leads us to consider morality as scaled in degrees.
Eating plant may not arouse some sense of guilt, as a plant is also a creature. Or munching seeds of peanut may give us some pleasure when in
fact we are killing germinal life. Up the ladder, if there is such a moral ladder, consider the consumption of chicken meat. We kill the chicken
when we prepare it for cooking and consumption. Yet we, except some people, do not feel a moral compunction about it.
Hardwired For Survival
Humans are naturally aware of biological survival risks
Jeanna Bryner, staff analyst and editor, 9/24/07, Modern Humans Retain Caveman Survival Instincts, live science,
http://www.livescience.com/4631-modern-humans-retain-caveman-survival-instincts.html Date accessed- 7/16/13
Like hunter-gatherers in the jungle, modern humans are still experts at spotting predators and prey,
despite the developed world's safe suburbs and indoor lifestyle, a new study suggests. ¶ The research, published online this week in the
Proceedings of the National Academy of Sciences , reveals that humans today are hard-wired to pay attention to other people and animals
much more so than non-living things, even if inanimate objects are the primary hazards for modern, urbanized folks. ¶ The researchers
say the finding supports the idea that natural selection molded mechanisms into our ancestors' brains that were
specialized for paying attention to humans and other animals. These adaptive traits were then passed on to
us. ¶ "We're assuming that natural selection takes a long time to build anything anew and that's why this is left over from our past," said study
team member Leda Cosmides, an evolutionary psychologist at the University of California, Santa Barbara (UCSB). ¶ Ancestor's eyes ¶ Immersed
in a
rich, biotic environment, it would have been imperative for our ancestors to monitor both humans
and non-human animals. Predators and prey took many different forms—lions, tigers and bears—and they changed often, so
constant eyeballing was critical. ¶ While the environment has changed since then, with high-rises emerging where forests once took root and
pampered pets taking the place of stalking beasts, our instinct-driven attention has not followed suit. ¶ "Having
this pop-out
attentional bias for animals is sort of a vestigial behavior," said study team member Joshua New of Yale University's
Perception and Cognition Lab. ¶ In the study, groups of undergraduate students from UCSB, watched images displayed on computer
monitors. The flashing images alternated between pairs of various outdoor scenes, with the first image
showing one scene and the next an alternate version of that scene with one change. Participants
indicated each time whether they detected a change. ¶ The photographs included animate categories, such as people and
other animals, as well as inanimate ones, such as plants, artifacts that can be manipulated (stapler or wheelbarrow) and fixed artifacts, such as
landmarks (windmill or house). ¶ Modern hunter-gatherers ¶ Overall,
the subjects were faster and more accurate at
detecting changes involving all animals compared with inanimate objects. They correctly detected nearly 90
percent of the changes to "living" targets compared with 66 percent for inanimate objects. ¶ In particular, the students spotted changes in
elephant and human scenes 100 percent of the time, while they had a success rate of just over 75 percent for photos showing a silo and 67
percent for those with a coffee mug. ¶ Though we are more likely to meet death via an SUV than a charging wildebeest, the results indicated
subjects were slower and less successful at detecting changes to vehicles than to animals. ¶ The researchers compare our attentional bias
toward animals to the appendix, an organ present in modern humans because it was useful for our ancestors, but useless now. ¶ These results
have implications for phobias and other behaviors that involve focus toward specific categories of objects over others. ¶ "People develop
phobias for spiders and snakes and things that were ancestral threats. It's very infrequent to have somebody afraid of cars or electrical outlets,"
New told LiveScience . "Those statistically pose much more of a threat to us than a tiger. That makes it an interesting test case as to why do
tigers still capture attention."
Error Theory
ERROR THEORY DEMANDS THE EPISTEMIC REASON BE SEPARATE FROM MORALITY
Rowland, Richard., Journal on Ethics on Social Philosophy, January 2013, Moral Error Theory and the Arguments from Epistemic
Reasons, http://www.jesp.org/PDF/Moral%20Error%20Theory_final.pdf
Error theorists are not skeptical of hypothetical reasons.10 But they hold ¶ that if there are only
hypothetical reasons, our understanding of morality ¶ is radically mistaken, because our
understanding of morality entails that ¶ there are categorical reasons.¶ 11 However, our understanding
of epistemic ¶ reasons and justification also entails that there are categorical reasons. As ¶ I said, it seems
that there is reason for everyone to believe that dinosaurs ¶ once roamed the earth regardless of what
they want to believe; there ¶ would still be reason for me to believe that I am in my office writing right
¶ now even if believing this made me extremely unhappy or did not promote any of my desires. Two
agents in the same epistemic situation seem ¶ to have the same epistemic reasons, regardless of their
desires or goals or the roles that they find themselves in, just as two people who see a child ¶
drowning seem to have moral reasons to save the child regardless of their ¶ desires, goals or roles. So,
if there are only hypothetical reasons for belief, ¶ our understanding of epistemic reasons is just as
badly mistaken as our ¶ understanding of morality and moral reasons is if there are only hypothetical
reasons for action.
There is a nuanced difference between nihilism and Error Theory, the later concedes
that we try to make moral jdugements.
Joyce, Richard., Entry for Encyclopedia of Ethics, 2013, “NIHILISM”, Encyclopedia,
http://www.victoria.ac.nz/staff/richard_joyce/acrobat/joyce_nihilism.pdf
Even restricting attention to “moral
nihilism,” matters remain indeterminate. Its most ¶ prominent usage in the field of
metaethics treats it as a synonym for “error theory,” therefore ¶ an entry that said only “Nihilism: see ERROR THEORY”
would not be badly misleading. ¶ This would identify moral nihilism as the metaethical view that moral
discourse consists of ¶ assertions that systematically fail to secure the truth. (See Mackie 1977; Joyce
2001.) ¶ A broader definition of “nihilism” would be “the view that there are no moral facts.” This ¶ is
broader because it covers not only the error theory but also noncognitivism (see¶ NONCOGNITIVISM).
Both these theories deny that there are moral facts—the difference ¶ being that the error theorist
thinks that in making moral judgments we try to state facts (but ¶ fail to do so, because there are no
facts of the type in question), whereas the noncognitivist ¶ thinks that in making moral judgments we
do not even try to state facts (because, for ¶ example, these judgments are really veiled commands or
expressions of desire). (In ¶ characterizing noncognitivism in this way, I am sidelining various linguistic permissions that ¶ may be
earned via the quasi-realist program (see QUASI-REALISM).) While it is not ¶ uncommon to see “nihilism” defined in this broader way, few
contemporary noncognitivists ¶ think of themselves as “nihilists,” so it is reasonable to suspect that the extra breadth of the ¶ definition is often
unintentional.
NEITZSCHE SUPPORTS ERROR THEORY
Joyce, Richard., Entry for Encyclopedia of Ethics, 2013, “NIHILISM”, Encyclopedia,
http://www.victoria.ac.nz/staff/richard_joyce/acrobat/joyce_nihilism.pdf
Various eighteenth- and nineteenth-century continental philosophers (e.g., Schopenhauer, Feuerbach,
Fichte, Kierkegaard) are associated in one way or another with nihilism, though their nihilistic streaks
tend to be each so sui generis as to defy easy categorization. Even Nietzsche, who is often treated as a
kind of grandfather of European nihilism, is extremely different to classify (see NIETZSCHE,
FRIEDRICH). In certain moods he seems to be clearly advocating an error theory (moral nihilism). In
Twilight of the Idols he writes: There are absolutely no moral facts. What moral and religious
judgments have in common is the belief in things that are not real. Morality is just an interpretation of
certain phenomena or (more accurately) a misinterpretation. (1889, VIII.1 / 2005: 182)
MORAL ERROR THEORY REJECTS FIRST-ORDER MORAL CLAIMS
Olson, Jonas., Department of Philosophy at Stockholm University, 2010, Error Theory and Reasons to Believe,
people.su.se/~jolso/papers/DefMETapril2010.doc
according to
moral error theory, first-order moral claims are uniformly false. First-order moral claims are claims
that entail something about what some agent morally ought to do or not to do, what would be
morally permissible or impermissible for some agent to do or not to do, what there is moral reasons
for some agent to do or not to do, and the like; or what would be morally good (bad) or morally
(un)desirable, and the like. Hence, if error theory is correct, the claim that, e.g., torture is wrong is
false. But the law of the excluded middle entails that if it is false that torture is wrong, it is true that
torture is not wrong. And the negative claim that torture is not wrong appears to entail that torture is
morally permissible, which is clearly a first-order moral claim. This suggests that contrary to the
contentions of many moral error theorists, moral error theory does have distinctive first-order moral
implications. And rather vulgar ones at that; anything turns out to be morally permissible! I shall not attempt
to resolve this issue here. I note merely that one possible strategy for sidestepping this problem is to
opt for a version of moral error theory that says that first-order moral claims rest on false
presuppositions and are therefore uniformly neither true nor false. In order not to exclude this
version of moral error theory, I shall take moral error theory to be the view that no first-order moral
claim is true. Analogously, I shall take epistemic error theory to be the view that no first-order
epistemic claim is true, where first-order epistemic claims are claims to the effect that there are
epistemic reasons for some agent to believe or not to believe some proposition or that believing some
proposition is or would be permissible or impermissible, and the like.
Before I get started I need to make a brief preliminary remark about formulations of error theories. It is routinely said that
Quasi- Realism
QUASI-REALISM BAD BECAUSE IT LEGITAMIZES CONTRADICTING ETHICS
Moore, A.W., Philosopher of Philosophy at St. Hugh’s College, July 2002, Quasi-Realism and Relativism,
http://users.ox.ac.uk/~shug0255/pdf_files/quasi-realism-and-relativism.pdf
If it is true that ‘an ethic is the propositional reflection of the dispositions ¶ and attitudes, policies and
stances, of people,’ as Simon Blackburn says in ¶ summary of the quasi-realism that he champions in this excellent and wonder- ¶ fully
provocative book (p. 310), then it seems to follow that different dispo- ¶ sitions, attitudes, policies and
stances-different conative stares, for ¶ short-will issue in different ethics, each with an equal claim to
truth; and ¶ this in turn seems to be one thing that could be reasonably meant by that ¶ slippery
polyseme ‘relativism’. If such relativism does follow, a good deal ¶ remains to be said about how much
force it has. At the limit it might do no ¶ more than signal the abstract possibility of an ethic rivalling
that of humans. ¶ More potently, it might somehow legitimize the different ethics of different ¶ groups
of humans in actual conflict with one another. But without the possibility of some such variability of
ethic to match a possible variability of ¶ conative state, the quasi-realist’s claim that an ethic ‘reflects’
a particular ¶ combination of conative states appears hollow.
OUR COGNATIVE STATES EFFECT OUR MORAL STANDARDS
Moore, A.W., Philosopher of Philosophy at St. Hugh’s College, July 2002, Quasi-Realism and Relativism,
http://users.ox.ac.uk/~shug0255/pdf_files/quasi-realism-and-relativism.pdf
The relativism in question is not the view that, had our conative states been different, different ethical
standards might have applied; Blackburn has persistently and persuasively argued that he is not committed to anything like that.
Nor is it the view that, had our conative states been different, we might have applied different ethical
standards; that is a platitude (and scarcely merits the label ‘relativism’). The view is something lying
subtly between these, ¶ namely that, had our conative states been different, we might have applied
different ethical standards and it might have been right for us to do so; we might have had different
ethical beliefs and those different ethical beliefs ¶ might have been true.
Legality
Legality is the base of societal morals
George C. Christie. ON THE MORAL OBLIGATION TO OBEY THELAW. Duke Law Journal December, 1990.
There is, however, an epistemologically more basic point that can be made here. The stark separation between law and morality-the
assumption that the law does not affect morality-is simply untenable. In particular, I wish to assert that the prevailing public morality
of
any society is very definitely influenced by the law. 2 4 No serious observer of American society over the past thirty years,
and certainly no one who has spent a substantial portion of that time in the South, can have any doubt that decisions like Brown v. Board of
Education 25 and federal civil rights legislation
have profoundly influenced public perceptions as to the morality
as to what constitutes "theft," "fraud," or "stealing" are profoundly
influenced by legal analysis-indeed, "theft" and "fraud" are legal terms of art. My argument, of course, is not
that we should go to the opposite extreme and deny the force of morality in the law; instead, I wish to argue that the two are
inseparable: It is a chicken-and-egg situation. Many of the writers I have mentioned, for example, use the act of promising as
of segregation. Furthermore, notions
an illustration of the kind of activity that generates moral obligations. Yet, in their often extended discussions as to when promises create
binding moral obligations, they curiously fall back on the analysis used by lawyers to determine whether contracts are legally binding. To
demonstrate that promises create moral obligations in certain circumstances, these writers sometimes cite actual legal decisions and legal
treatises, and they even cite the Uniform Commercial Code and the Restatement of Contracts. 2 6 Some of them even expressly adopt the legal
position that promissory obligations are ultimately created by the reasonable objective expectations of the other parties to the transaction and
not by the actual subjective intent of the alleged promisor 2 7 If the critics of legal obligation are telling us anything, it appears to be that if a
promise creates a legal obligation, it also creates a moral obligation. The example of promising
also shows that the separation of morally significant matters (in which moral obligations
supply the needed direc- tion) from the problems of social coordination in a complex
world (in which law sometimes shows the way) is simply untenable. In a complex world,
everything is a matter of social coordination, as the practice of promising demonstrates.
The point can be made even more decisively by taking a situation that would appear
to provide one of the paradigmatic examples of morality, in and of itself, providing a
sufficient basis of obli- gation, namely, the circumstances under which the killing of
another human being is permissible. It is instructive to note that, when Raz dis- cusses this situation, he talks
of "laws prescribing behaviour which is morally obligatory independently of the law (e.g. prohibiting murder, The example of
promising also shows that the separation of morally significant matters (in which moral obligations supply the needed direction) from the problems of social coordination in a complex world (in which law sometimes shows the way) is simply
untenable. In a complex world, everything is a matter of social coordination, as the practice of promising demonstrates. The
point can be made even more decisively by taking a situation that would appear to provide one of the paradigmatic
examples of morality, in and of itself, providing a sufficient basis of obli- gation, namely, the circumstances under which the
killing of another human being is permissible. It is instructive to note that, when Raz discusses this situation, he talks of
"laws prescribing behaviour which is morally obligatory independently of the law (e.g. prohibiting murder,
Rule of Law
The rule of is necessary to limit abuses of the majority.
Michael Meyer-Resende is a director of Democracy Reporting International, a Berlin-based group promoting
political participation.
09 Democracy Reporting International
http://www.democracy-reporting.org/files/essential_elements_of_democracy_2.pdf date accessed
7/20/13 Democracy Reporting International
There are few definitions of the rule of law in the context of international instruments related to ensuring democratic practices within states.30
Nonetheless, its core meaning is clear. That is, the
rule of law commits all public authorities to comply with
independently and impartially administered legal and justice systems, such that states make
continuous efforts ¶ ‘[g]uaranteeing that no individual or public or private institution is above the
law’.31 Sometimes the rule of law is narrowly construed as an efficient and effective system of justice and
law enforcement. Beyond that, it is also interpreted to imply certain standards for ¶ the legislative process, namely that this should be
an open and transparent process that reflects the will of the people and the outcomes of which are public and freely available. Increasingly, the
rule of law is seen through a broader conceptual framework ¶ that links it to human rights and democratic order; e.g., UN Human Rights
Commission resolution on democracy and the rule of law (resolution 2005/32), the OSCE Copenhagen 1990 commitments and the Charter of
Paris for a New Europe. ¶ As
an inherent element of democracy, the rule of law therefore indicates that the
will of the majority has clear and certain limits, not only in the form of universal human rights, but
also in relation to the constitutional framework of a state. Consequently, for example, public referenda should not be
used to overrule constitutional provisions.
Rule of law ensures security and democracy
Gabriel Marcella, teaches strategy in the Department of National Security and Strategy of the United
States Army War College, Carlisle, Pennsylvania. The Imperative of the Rule of Law in the Democratic
State.¶ DEMOCRATIC GOVERNANCE AND THE RULE ¶ OF LAW:¶ LESSONS FROM COLOMBIA. December
2009 date accessed 7/20/13 http://www.StrategicStudiesInstitute.army.mil/
¶ Any discussion of democratic governance in conflicted societies must begin with security and the ¶
rule of law. Although security, state presence, and social and economic progress are all important
mutually ¶ reinforcing elements in establishing a government’s authority and legitimacy, it is the rule
of law and its ¶ acceptance by the people that binds them all together. Democracy is not possible
without security, and ¶ security without the rule of law is a Hobbesian hell. Achieving security and the rule of law
requires political ¶ will, resources, and time to repair and build institutions and develop the rules of democratic community that ¶ are generally
accepted by the populace. That
is why the Constitution of the United States and the Declaration ¶ of
Independence are such singular documents. They codified a long process of institutional and political ¶
development that began before the Magna Carta in 1215 and ultimately transformed 13 colonies into a ¶ democratic state that survived a
great civil war and is still evolving in the 21st century. Indeed, the Magna ¶ Carta was itself the result of the security and enforcement of the
King’s Law, established by English monarchs as early as Henry II (1154-89). Within the security provided by the Magna Carta, the barons took
the first steps towards what eventually became widespread parliamentary democracy.
The rule of law makes democracy work
because law is the collective will of society, making possible the monopoly on the legitimate use of force, equal rights, and social
order. Six elements comprise the rule of law: order and security, legitimacy, and checks.
Download