NSA Affirmative SLUDL/NAUDL 2015-16 NSA Affirmative NSA Affirmative ..................................................................................................................................................... 1 Summary ................................................................................................................................................................. 3 Glossary .................................................................................................................................................................. 4 1st Affirmative Constructives NSA 1AC (4-min Version) (1/4) ........................................................................................................................ 5 NSA 1AC (Short Version) (1/6) ......................................................................................................................... 9 NSA 1AC (Long Version) (1/18) ..................................................................................................................... 15 Privacy Extensions Answers to NSA not Invasive ........................................................................................................................... 33 Answer to Privacy Invasions Inevitable ........................................................................................................... 35 Answers to “Corporations violate privacy ” ..................................................................................................... 36 Answers to Security Comes First ...................................................................................................................... 39 Answers to “Posner – Balancing Good” ........................................................................................................... 41 Privacy is a Gateway Right ............................................................................................................................... 44 Privacy is key to Autonomy.............................................................................................................................. 45 Surveillance Hurts Freedom ............................................................................................................................. 46 Surveillance causes a Chilling Effect ............................................................................................................... 48 Fear Magnifies Privacy Loss ............................................................................................................................ 50 Answer to “Nothing to Hide” ........................................................................................................................... 51 Economy Extensions Economy Advantage – Internal Link Magnifier ............................................................................................... 52 Answers to Hurts Foreign Companies More .................................................................................................... 54 Answers to Companies won’t leave cloud ........................................................................................................ 55 Answers to Tech industry not hurt .................................................................................................................... 56 Answers to Economic Decline Doesn’t Cause War ......................................................................................... 57 Answers to Cybersecurity Sector Turn ............................................................................................................. 58 Internet Freedom Extensions Answers to USA Freedom Act Solves .............................................................................................................. 59 Answers to Internet Freedom Doesn’t Spur Democracy .................................................................................. 60 Answers to Internet Freedom is about Profits................................................................................................... 61 Answers to International Surveillance matters more ........................................................................................ 62 Answers to US not modelled ............................................................................................................................ 63 1/92 NSA Affirmative SLUDL/NAUDL 2015-16 Answers to Democracy doesn’t solve war ........................................................................................................ 64 Inherency/Harms Extensions Answers to USA Freedom Act Solves .............................................................................................................. 65 Answers to Domestic Collection is Small ........................................................................................................ 67 Solvency Extensions Limiting Section 702 Solves ............................................................................................................................. 69 Plan Solves PRISM ........................................................................................................................................... 70 Answers to Reforming domestic surveillance alone doesn’t solve .................................................................. 71 Answers to Circumvention ............................................................................................................................... 74 Topicality Answers (JV & V Only) Topicality Domestic (JV & V Only) ................................................................................................................. 78 Terrorism DA Answers NSA Surveillance doesn’t stop terrorism (Terror DA Ans) ............................................................................. 82 Surveillance causes false positives ................................................................................................................... 84 Surveillance creates too much data ................................................................................................................... 86 Surveillance creates bad data ............................................................................................................................ 87 Answer to: would have solved 9/11 .................................................................................................................. 88 Executive Order CP Answers (JV & V Only) Answer to the Executive Counterplan (JV & V Only) ..................................................................................... 90 Politics DA Answers (V Only) Answers to Politics – Plan is popular (V Only) ................................................................................................ 91 2/92 NSA Affirmative SLUDL/NAUDL 2015-16 Summary This affirmative case argues that the National Security Administration (NSA) current data collection practices are harmful and should be reformed. The affirmative focuses on domestic data collection. You can choose to construct a case with up to 3 advantages (Privacy, Economy, or Internet Freedom). Read the file select your favorite advantages and practice to make sure you can finish in 8 minutes. Remember the solvency cards to. Privacy- the NSA currently collects data on millions of internet users who are connected in some way to international communications that the organization is monitoring. This advantage argues that this domestic surveillance practice is a violation of the rights of US citizens and not needed to protect the country from a terrorist attack. Economy- this advantage argues that NSA domesitic spying programs have hurt the American technology sector as businesses around the world avoid using American products like Dropbox and Google since their content could be monitored by the government. This economic slow down could hurt the world economy and lead to wars. Internet Freedom- this advantage argues that a domestic surveillance program run by the NSA hurts the ability of the US to persuade dictatorships and other authoritarian governments to maintain a free internet. Access to the internet is crucial to fostering democratic transitions around the world. Democratic governments increase peace and are less likely to start wars. The affirmative would solve this advantages by placing limits on the collection of data to only communication to or from a suspect in an active investigation. This would prevent the government from stockpiling information on every citizen and help make the search for terrorists and other dangerous groups more efficient. 3/92 NSA Affirmative SLUDL/NAUDL 2015-16 Glossary FISA- The Foreign Intelligence Surveillance Act of 1978 ("FISA" Pub.L. 95–511, 92 Stat. 1783, 50 U.S.C. ch. 36) is a United States federal law which prescribes procedures for the physical and electronic surveillance and collection of "foreign intelligence information" between "foreign powers" and "agents of foreign powers" Moore’s Law- is the observation that the number of transistors in a dense integrated circuit has doubled approximately every two years. In other words, computers get twice as powerful every 2 years. NSA- is an intelligence organization of the United States government, responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purpos PRISM- s a clandestine surveillance program under which the United States National Security Agency (NSA) collects internet communications from at least nine major US internet companies. Upstream- term used by the National Security Agency (NSA) of the United States for intercepting telephone and internet traffic from the internet backbone, i.e. major internet cables and switches, both domestic and foreign. 4/92 NSA Affirmative SLUDL/NAUDL 2015-16 NSA 1AC (4-min Version) (1/4) Observation 1 –The USA Freedom Act did not reform the NSA’s mass collection of domestic communication. The agency still has authority to gather data under Section 702 of the FISA Amendments Act. Goitein, Co-Director Brennan Center for Justice’s Liberty and National Security Program 2015, (Elizabeth, , 6-5-2015, "Who really wins from NSA reform?," MSNBC, http://www.msnbc.com/msnbc/freedom-act-who-really-wins-nsa-reform) Even under USA Freedom, however, the government is still able to pull in a great deal of information about innocent Americans. Needless to say, not everyone in contact with a suspected terrorist is guilty of a crime; even terrorists call for pizza delivery. Intelligence officials also may need to obtain records – like flight manifests – that include information about multiple people, most of whom have nothing to do with terrorism. Some of this “overcollection” may be inevitable, but its effects could be mitigated. For instance, agencies could be given a short period of time to identify information relevant to actual suspects, after which they would have to destroy any remaining information. USA Freedom fails to impose such limits. More fundamentally, bulk collection of business records is only one of the many intelligence activities that Until a few years ago, if the NSA, acting within the United States, wished to obtain communications between Americans and foreigners, it had to convince the FISA Court that the individual target was a foreign power or its agent. Today, under Section 702 of the FISA Amendments Act, the NSA may target any foreigner overseas and collect his or her communications with Americans without obtaining any individualized court order. Under Executive Order 12333, which governs the NSA’s activities when it conducts surveillance overseas, the standards are even more lax. The result is mass surveillance programs that make the phone metadata program seem dainty in comparison. Even though these programs are nominally targeted at foreigners, they “incidentally” sweep in massive amounts of Americans’ data, including the content of calls, e-mails, text messages, and video chats. Limits on keeping and using such information are weak and riddled with exceptions. Moreover, foreign targets are not limited to suspected terrorists or even abandoned the individualized suspicion approach after 9/11. agents of foreign powers. As the Obama administration recently acknowledged, foreigners have privacy rights too, and the ability to eavesdrop on any foreigner overseas is an indefensible violation of those rights. Intelligence officials almost certainly supported USA Freedom because they hoped it would relieve the post-Snowden pressure for reform. Their likely long-term goal is to avoid changes to Section 702, Executive Order 12333, and the many other authorities that permit intelligence collection without any individualized showing of wrongdoing. Privacy advocates who supported USA Freedom did so because they saw it as the first skirmish in a long battle to rein in surveillance authorities. Their eye is on the prize: a return to the principle of individualized suspicion as the basis for surveillance. If intelligence officials are correct in their calculus, USA Freedom may prove to be a Pyrrhic victory. But if the law clears the way for further reforms across the full range of surveillance programs, history will vindicate the privacy advocates who supported it. The answer to what USA Freedom means for our liberties lies, not in the text of the law, but in the unwritten story of what happens next. 5/92 NSA Affirmative SLUDL/NAUDL 2015-16 NSA 1AC (4-min Version) (2/4) Observation 2: This creates massive privacy violations, which are more dangerous than any risk of terrorism Schneier, fellow at the Berkman Center for Internet and Society at Harvard Law School, 2014 Bruce 1-6-2014, "Essays: How the NSA Threatens National Security," Schneier On Security, https://www.schneier.com/essays/archives/2014/01/how_the_nsa_threaten.html We have no evidence that any of this surveillance makes us safer. NSA Director General Keith Alexander responded to these stories in June by claiming that he disrupted 54 terrorist plots. In October, he revised that number downward to 13, and then to "one or two." At this point, the only "plot" prevented was that of a San Diego man sending $8,500 to support a Somali militant group. We have been repeatedly told that these surveillance programs would have been able to stop 9/11, yet the NSA didn't detect the Boston bombings—even though one of the two terrorists was on the watch list and the other had a sloppy social media trail. Bulk collection of data and metadata is an ineffective counterterrorism tool. Not only is ubiquitous surveillance ineffective, it is extraordinarily costly. I don't mean just the budgets, which will continue to skyrocket. Or the diplomatic costs, as country after country learns of our surveillance programs against their citizens. I'm also talking about the cost to our society. It breaks so much of what our society has built. It breaks our political systems, as Congress is unable to provide any meaningful oversight and citizens are kept in the dark about what government does. It breaks our legal systems, as laws are ignored or reinterpreted, and people are unable to challenge government actions in court. It breaks our commercial systems, as U.S. computer products and services are no longer trusted worldwide. It breaks our technical systems, as the very protocols of the Internet become untrusted. And it breaks our social systems; the loss of privacy, freedom, and liberty is much more damaging to our society than the occasional act of random violence. And finally, these systems are susceptible to abuse. This is not just a hypothetical problem. Recent history illustrates many episodes where this information was, or would have been, abused: Hoover and his FBI spying, McCarthy, Martin Luther King Jr. and the civil rights movement, anti-war Vietnam protesters, and—more recently—the Occupy movement. Outside the U.S., there are even more extreme examples. Building the surveillance state makes it too easy for people and organizations to slip over the line into abuse. 6/92 NSA Affirmative SLUDL/NAUDL 2015-16 NSA 1AC (4-min Version) (3/4) We find the current state of affairs troubling and offer the following Plan: The United States federal government will limit the scope of its domestic surveillance under Section 702 of the Foreign Intelligence Surveillance Act to communications whose sender or recipient is a valid intelligence target and whose targets pose a tangible threat to national security. 7/92 NSA Affirmative SLUDL/NAUDL 2015-16 NSA 1AC (4-min Version) (4/4) Observation 3 – Limiting the scope of the Section 702 authority is critical to solve overcollection of American communications. Laperruque, Fellow on Privacy, Surveillance, and Security at Center for Democracy and Technology, 2014, (Jake, "Why Average Internet Users Should Demand Significant Section 702 Reform," Center For Democracy & Technology., 7-22-2014, https://cdt.org/blog/why-average-internet-users-should-demand-significant-section-702-reform/ Where Do We Go From Here? There are sensible reforms that can significant limit the collateral damage to privacy caused by Section 702 without impeding national security. Limiting the purposes for which Section 702 can be conducted will narrow the degree to which communications are monitored between individuals not suspected of wrongdoing or connected to national security threats. Closing retention loopholes present in the Minimization Guidelines governing that surveillance will ensure that when Americans’ communications are incidentally collected, they are not kept absent national security needs. And closing the backdoor search loophole would ensure that when Americans’ communications are retained because they communicated with a target of Section 702 surveillance, they couldn’t be searched unless the standards for domestic surveillance of the American are met. 8/92 NSA Affirmative SLUDL/NAUDL 2015-16 NSA 1AC (Short Version) (1/6) Observation 1 – The government engages in mass surveillance 1. The USA Freedom Act did not reform the NSA’s mass collection of domestic communication. The agency still has authority to gather data under Section 702 of the FISA Amendments Act. Goitein, Co-Director Brennan Center for Justice’s Liberty and National Security Program 2015, (Elizabeth, , 6-5-2015, "Who really wins from NSA reform?," MSNBC, http://www.msnbc.com/msnbc/freedom-act-who-really-wins-nsa-reform) Even under USA Freedom, however, the government is still able to pull in a great deal of information about innocent Americans. Needless to say, not everyone in contact with a suspected terrorist is guilty of a crime; even terrorists call for pizza delivery. Intelligence officials also may need to obtain records – like flight manifests – that include information about multiple people, most of whom have nothing to do with terrorism. Some of this “overcollection” may be inevitable, but its effects could be mitigated. For instance, agencies could be given a short period of time to identify information relevant to actual suspects, after which they would have to destroy any remaining information. USA Freedom fails to impose such limits. More fundamentally, bulk collection of business records is only one of the many intelligence activities that Until a few years ago, if the NSA, acting within the United States, wished to obtain communications between Americans and foreigners, it had to convince the FISA Court that the individual target was a foreign power or its agent. Today, under Section 702 of the FISA Amendments Act, the NSA may target any foreigner overseas and collect his or her communications with Americans without obtaining any individualized court order. Under Executive Order 12333, which governs the NSA’s activities when it conducts surveillance overseas, the standards are even more lax. The result is mass surveillance programs that make the phone metadata program seem dainty in comparison. Even though these programs are nominally targeted at foreigners, they “incidentally” sweep in massive amounts of Americans’ data, including the content of calls, e-mails, text messages, and video chats. Limits on keeping and using such information are weak and riddled with exceptions. Moreover, foreign targets are not limited to suspected terrorists or even abandoned the individualized suspicion approach after 9/11. agents of foreign powers. As the Obama administration recently acknowledged, foreigners have privacy rights too, and the ability to eavesdrop on any foreigner overseas is an indefensible violation of those rights. Intelligence officials almost certainly supported USA Freedom because they hoped it would relieve the post-Snowden pressure for reform. Their likely long-term goal is to avoid changes to Section 702, Executive Order 12333, and the many other authorities that permit intelligence collection without any individualized showing of wrongdoing. Privacy advocates who supported USA Freedom did so because they saw it as the first skirmish in a long battle to rein in surveillance authorities. Their eye is on the prize: a return to the principle of individualized suspicion as the basis for surveillance. If intelligence officials are correct in their calculus, USA Freedom may prove to be a Pyrrhic victory. But if the law clears the way for further reforms across the full range of surveillance programs, history will vindicate the privacy advocates who supported it. The answer to what USA Freedom means for our liberties lies, not in the text of the law, but in the unwritten story of what happens next. 2. The NSA has massively expanded its surveillance. Since 2008, American internet communication have been intercepted far more often than legitimate surveillance targets. Gellman, Washington Post Staff Write, 2014 Barton 7-5-2014, "In NSA-intercepted data, those not targeted far outnumber the foreigners who are," Washington Post, https://www.washingtonpost.com/world/national-security/in-nsa-intercepted-data-those-not-targeted-far-outnumber-the-foreigners-who-are/2014/07/05/ Ordinary Internet users, American and non-American alike, far outnumber legally targeted foreigners in the communications intercepted by the National Security Agency from U.S. digital networks, according to a four-month investigation by The Washington Post. Nine of 10 account holders found in a large cache of intercepted conversations , which former NSA contractor Edward Snowden provided in full to The Post, were not the intended surveillance targets but were caught in a net the agency had cast for somebody else. Many of them were Americans. Nearly half of the surveillance files, a strikingly high proportion, contained names, e-mail addresses or other details that the NSA marked as belonging to U.S. citizens or residents. NSA analysts masked, or “minimized,” more than 65,000 such references to protect Americans’ privacy, but The Post found nearly 900 additional e-mail addresses, unmasked in the files, that could be strongly linked to U.S. citizens or U.S.residents. The surveillance files highlight a policy dilemma that has been aired only abstractly in public. There are discoveries of considerable intelligence value in the intercepted messages — and collateral harm to privacy on a scale that the Obama administration has not been willing to address. 9/92 NSA Affirmative SLUDL/NAUDL 2015-16 NSA 1AC (Short Version) (2/6) Observation 2: This creates massive privacy violations 1. These privacy violations are more dangerous than any risk of terrorism Schneier, fellow at the Berkman Center for Internet and Society at Harvard Law School, 2014 Bruce 1-6-2014, "Essays: How the NSA Threatens National Security," Schneier On Security, https://www.schneier.com/essays/archives/2014/01/how_the_nsa_threaten.html We have no evidence that any of this surveillance makes us safer. NSA Director General Keith Alexander responded to these stories in June by claiming that he disrupted 54 terrorist plots. In October, he revised that number downward to 13, and then to "one or two." At this point, the only "plot" prevented was that of a San Diego man sending $8,500 to support a Somali militant group. We have been repeatedly told that these surveillance programs would have been able to stop 9/11, yet the NSA didn't detect the Boston bombings—even though one of the two terrorists was on the watch list and the other had a sloppy social media trail. Bulk collection of data and metadata is an ineffective counterterrorism tool. Not only is ubiquitous surveillance ineffective, it is extraordinarily costly. I don't mean just the budgets, which will continue to skyrocket. Or the diplomatic costs, as country after country learns of our surveillance programs against their citizens. I'm also talking about the cost to our society. It breaks so much of what our society has built. It breaks our political systems, as Congress is unable to provide any meaningful oversight and citizens are kept in the dark about what government does. It breaks our legal systems, as laws are ignored or reinterpreted, and people are unable to challenge government actions in court. It breaks our commercial systems, as U.S. computer products and services are no longer trusted worldwide. It breaks our technical systems, as the very protocols of the Internet become untrusted. And it breaks our social systems; the loss of privacy, freedom, and liberty is much more damaging to our society than the occasional act of random violence. And finally, these systems are susceptible to abuse. This is not just a hypothetical problem. Recent history illustrates many episodes where this information was, or would have been, abused: Hoover and his FBI spying, McCarthy, Martin Luther King Jr. and the civil rights movement, anti-war Vietnam protesters, and—more recently—the Occupy movement. Outside the U.S., there are even more extreme examples. Building the surveillance state makes it too easy for people and organizations to slip over the line into abuse. 10/92 NSA Affirmative SLUDL/NAUDL 2015-16 NSA 1AC (Short Version) (3/6) 2. Privacy is a gateway right, it enables all of our other freedoms. PoKempne, General Counsel at Human Rights Watch, 2014, (Dinah, , “The Right Whose Time Has Come (Again): Privacy in the Age of Surveillance” 1/21/14 http://www.hrw.org/world-report/2014/essays/privacy-in-age-ofsurveillance) Technology has invaded the sacred precincts of private life, and unwarranted exposure has imperiled our security, dignity, and most basic values. The law must rise to the occasion and protect our rights. Does this sound familiar? So argued Samuel Warren and Louis Brandeis in their 1890 Harvard Law Review article announcing “The Right to Privacy.” We are again at such a juncture. The technological developments they saw as menacing—photography and the rise of the mass circulation press—appear rather quaint to us now. But the harms to emotional, psychological, and even physical security from unwanted exposure seem just as vivid in our digital age.Our renewed sense of vulnerability comes as almost all aspects of daily social life migrate online . At the same time, corporations and governments have acquired frightening abilities to amass and search these endless digital records, giving them the power to “know” us in extraordinary detail. In a world where we share our lives on social media and trade immense amounts of personal information for the ease and convenience of online living, some have questioned whether privacy is a relevant concept. It is not just relevant, but crucial. privacy is a gateway right that affects our ability to exercise almost every other right, not least our freedom to speak and associate with those we choose, make political choices, practice our religious beliefs, seek medical help, access education, figure out whom we love, and create our family life. It is nothing less than the shelter in which we work out what we think and who we are; a fulcrum of our autonomy as individuals. Indeed, The importance of privacy, a right we often take for granted, was thrown into sharp relief in 2013 by the steady stream of revelations from United States government files released by former National Security Agency (NSA) contractor Edward Snowden, and published in the Guardian and other major newspapers around the revelations, supported by highly classified documents, showed the US, the UK, and other governments engaged in global indiscriminate data interception, largely unchecked by any meaningful legal constraint or oversight, without regard for the rights of millions of people who were not suspected of wrongdoing. world. These 11/92 NSA Affirmative 1st Affirmative Constructive NAUDL 2015-16 NSA 1AC (Short Version) (4/6) We find the current state of affairs troubling and offer the following Plan: The United States federal government will limit the scope of its domestic surveillance under Section 702 of the Foreign Intelligence Surveillance Act to communications whose sender or recipient is a valid intelligence target and whose targets pose a tangible threat to national security. 12/92 NSA Affirmative 1st Affirmative Constructive NAUDL 2015-16 NSA 1AC (Short Version) (5/6) Observation 3 – Our plan solves. 1. Limiting the scope of the Section 702 authority is critical to solve overcollection of American communications. Laperruque, Fellow on Privacy, Surveillance, and Security at Center for Democracy and Technology, 2014, (Jake, "Why Average Internet Users Should Demand Significant Section 702 Reform," Center For Democracy & Technology., 7-22-2014, https://cdt.org/blog/why-average-internet-users-should-demand-significant-section-702-reform/ Where Do We Go From Here? There are sensible reforms that can significant limit the collateral damage to privacy caused by Section 702 without impeding national security. Limiting the purposes for which Section 702 can be conducted will narrow the degree to which communications are monitored between individuals not suspected of wrongdoing or connected to national security threats. Closing retention loopholes present in the Minimization Guidelines governing that surveillance will ensure that when Americans’ communications are incidentally collected, they are not kept absent national security needs. And closing the backdoor search loophole would ensure that when Americans’ communications are retained because they communicated with a target of Section 702 surveillance, they couldn’t be searched unless the standards for domestic surveillance of the American are met. 13/92 NSA Affirmative 1st Affirmative Constructive NAUDL 2015-16 NSA 1AC (Short Version (6/6) 2. The plan eliminates the collection of communication “about” targets that prevents upstream collection. Nojeim, Director, Project on Freedom, Security & Technology, 2014 Greg, Comments To The Privacy And Civil Liberties Oversight Board Regarding Reforms To Surveillance Conducted Pursuant To Section 702 Of Fisa April 11, 2014 https://d1ovv0c9tw0h0c.cloudfront.net/files/2014/04/CDT_PCLOB-702-Comments_4.11.13.pdf C. Collection of communications “about” targets that are neither to nor from targets should be prohibited. The Government takes the position that Section 702 permits it to collect not only communications that are to or from a foreign intelligence target, but also communications that are “about” the target because they mention an identifier associated with the target.17 The practice directs the focus of surveillance away from suspected wrongdoers and permits the NSA to target communications between individuals with no link to national security investigations. Because this is inconsistent with the legislative history of the statute, and raises profound constitutional and operational problems, PCLOB should recommend that “about” collection be ended, and that Section 702 surveillance be limited to communications to and from targets. Section 702 authorizes the government to target the communications of persons reasonably believed to be abroad, but it never defines the term “target.” However, throughout Section 702, the term is used to refer to the targeting of an individual rather content of a communication.18 Further, the entire congressional debate on Section 702 includes no reference to collecting communications “about” a foreign target, and significant debate about collecting communications to or from a target.19 To collect “about” communications, the NSA engages in “upstream” surveillance on the Internet backbone,20 meaning “on fiber cables and infrastructure as data flows past,”21 temporarily copying the content of the entire data stream so it can be searched for the same “selectors” used for the downstream or “PRISM” surveillance. As a result, the NSA has the capability to search any Internet communication going into or out of the U.S.22 without particularized intervention by a provider. Direct access creates direct opportunity for abuse, and should not be permitted to a military intelligence agency. This dragnet scanning also results in the collection of “multi-communication transactions,” (MCTs) which include tens of thousands wholly domestic communications each year.23 The FISC required creation of new minimization rules for MCTs in 2011, but did not limit their collection.24 The mass searching of communications content inside the United States, knowing that it the communications searched include tens of thousands of wholly domestic communications each year, raises profound constitutional questions. Abandoning collection of communications “about” targets would remove any justification for upstream collection, eliminate the serious problems posed by direct government access to the Internet infrastructure, eliminate the collection of tens of thousands of wholly domestic communications in contravention of the statute, an make surveillance under Section 702 consistent with the congressional intent. 14/92 NSA Affirmative 1st Affirmative Constructive NAUDL 2015-16 NSA 1AC (Long Version) (1/18) Observation 1 – The USA Freedom Act did not reform the NSA’s mass collection of domestic communication. The agency still has authority to gather data under Section 702 of the FISA Amendments Act. Goitein, Co-Director Brennan Center for Justice’s Liberty and National Security Program 2015, (Elizabeth, , 6-5-2015, "Who really wins from NSA reform?," MSNBC, http://www.msnbc.com/msnbc/freedom-act-who-really-wins-nsa-reform) Even under USA Freedom, however, the government is still able to pull in a great deal of information about innocent Americans. Needless to say, not everyone in contact with a suspected terrorist is guilty of a crime; even terrorists call for pizza delivery. Intelligence officials also may need to obtain records – like flight manifests – that include information about multiple people, most of whom have nothing to do with terrorism. Some of this “overcollection” may be inevitable, but its effects could be mitigated. For instance, agencies could be given a short period of time to identify information relevant to actual suspects, after which they would have to destroy any remaining information. USA Freedom fails to impose such limits. More fundamentally, bulk collection of business records is only one of the many intelligence activities that abandoned the individualized suspicion approach after 9/11. Until a few years ago, if the NSA, acting within the United States, wished to obtain communications between Americans and foreigners, it had to convince the FISA Court that the individual target was a foreign power or its agent. Today, under Section 702 of the FISA Amendments Act, the NSA may target any foreigner overseas and collect his or her communications with Americans without obtaining any individualized court order. Under Executive Order 12333, which governs the NSA’s activities when it conducts surveillance overseas, the standards are even more lax. The result is mass surveillance programs that make the phone metadata program seem dainty in comparison. Even though these programs are nominally targeted at foreigners, they “incidentally” sweep in massive amounts of Americans’ data, including the content of calls, e-mails, text messages, and video chats. Limits on keeping and using such information are weak and riddled with exceptions. Moreover, foreign targets are not limited to suspected terrorists or even agents of foreign powers. As the Obama administration recently acknowledged, foreigners have privacy rights too, and the ability to eavesdrop on any foreigner overseas is an indefensible violation of those rights. Intelligence officials almost certainly supported USA Freedom because they hoped it would relieve the post-Snowden pressure for reform. Their likely long-term goal is to avoid changes to Section 702, Executive Order 12333, and the many other authorities that permit intelligence collection without any individualized showing of wrongdoing. Privacy advocates who supported USA Freedom did so because they saw it as the first skirmish in a long battle to rein in surveillance authorities. Their eye is on the prize: a return to the principle of individualized suspicion as the basis for surveillance. If intelligence officials are correct in their calculus, USA Freedom may prove to be a Pyrrhic victory. But if the law clears the way for further reforms across the full range of surveillance programs, history will vindicate the privacy advocates who supported it. The answer to what USA Freedom means for our liberties lies, not in the text of the law, but in the unwritten story of what happens next. 15/92 NSA Affirmative 1st Affirmative Constructive NAUDL 2015-16 NSA 1AC (Long Version) (2/18) Observation 2. The NSA has massively expanded its surveillance. Since 2008, American internet communication have been intercepted far more often than legitimate surveillance targets. Gellman, Washington Post Staff Write, 2014 Barton 7-5-2014, "In NSA-intercepted data, those not targeted far outnumber the foreigners who are," Washington Post, https://www.washingtonpost.com/world/national-security/in-nsa-intercepted-data-those-not-targeted-far-outnumber-the-foreigners-who-are/2014/07/05/ Ordinary Internet users, American and non-American alike, far outnumber legally targeted foreigners in the communications intercepted by the National Security Agency from U.S. digital networks, according to a fourmonth investigation by The Washington Post. Nine of 10 account holders found in a large cache of intercepted conversations, which former NSA contractor Edward Snowden provided in full to The Post, were not the intended surveillance targets but were caught in a net the agency had cast for somebody else. Many of them were Americans. Nearly half of the surveillance files, a strikingly high proportion, contained names, e-mail addresses or other details that the NSA marked as belonging to U.S. citizens or residents. NSA analysts masked, or “minimized,” more than 65,000 such references to protect Americans’ privacy, but The Post found nearly 900 additional e-mail addresses, unmasked in the files, that could be strongly linked to U.S. citizens or U.S.residents. The surveillance files highlight a policy dilemma that has been aired only abstractly in public. There are discoveries of considerable intelligence value in the intercepted messages — and collateral harm to privacy on a scale that the Obama administration has not been willing to address. 16/92 NSA Affirmative 1st Affirmative Constructive NAUDL 2015-16 NSA 1AC (Long Version) (3/18) We find the current state of affairs troubling and offer the following Plan: The United States federal government will limit the scope of its domestic surveillance under Section 702 of the Foreign Intelligence Surveillance Act to communications whose sender or recipient is a valid intelligence target and whose targets pose a tangible threat to national security. 17/92 NSA Affirmative 1st Affirmative Constructive NAUDL 2015-16 NSA 1AC (Long Version) (4/18) Observation 3 – Our plan solves. 1. Congressional action should be taken to limit the scope of data collection. Sinha, Fellow at Human Rights Watch, 2014 (G. Alex July 2014 “With Liberty to Monitor All How Large-Scale US Surveillance is Harming Journalism, Law, and American Democracy” Human Rights Watch, http://www.hrw.org/node/127364) Narrow the purposes for which all foreign intelligence surveillance may be conducted and limit such surveillance to individuals, groups, or entities who pose a tangible threat to national security or a comparable state interest. o Among other steps, Congress should pass legislation amending Section 702 of FISA and related surveillance authorities to narrow the scope of what can be acquired as “foreign intelligence information,” which is now defined broadly to encompass, among other things, information related to “the conduct of the foreign affairs of the United States.” It should be restricted to what is necessary and proportionate to protect legitimate aims identified in the ICCPR, such as national security. In practice, this should mean that the government may acquire information only from individuals, groups, or entities who pose a tangible threat to national security narrowly defined, or a comparable compelling state interest. 2. Limiting the scope of the Section 702 authority is critical to solve overcollection of American communications. Laperruque, Fellow on Privacy, Surveillance, and Security at Center for Democracy and Technology, 2014, (Jake, "Why Average Internet Users Should Demand Significant Section 702 Reform," Center For Democracy & Technology., 7-22-2014, https://cdt.org/blog/why-average-internet-users-should-demand-significant-section-702-reform/ Where Do We Go From Here? There are sensible reforms that can significant limit the collateral damage to privacy caused by Section 702 without impeding national security. Limiting the purposes for which Section 702 can be conducted will narrow the degree to which communications are monitored between individuals not suspected of wrongdoing or connected to national security threats. Closing retention loopholes present in the Minimization Guidelines governing that surveillance will ensure that when Americans’ communications are incidentally collected, they are not kept absent national security needs. And closing the backdoor search loophole would ensure that when Americans’ communications are retained because they communicated with a target of Section 702 surveillance, they couldn’t be searched unless the standards for domestic surveillance of the American are met. 18/92 NSA Affirmative 1st Affirmative Constructive NAUDL 2015-16 NSA 1AC (Long Version) (5/18) 3. The plan eliminates the collection of communication “about” targets that prevents upstream collection. Nojeim, Director, Project on Freedom, Security & Technology, 2014 Greg, Comments To The Privacy And Civil Liberties Oversight Board Regarding Reforms To Surveillance Conducted Pursuant To Section 702 Of Fisa April 11, 2014 https://d1ovv0c9tw0h0c.cloudfront.net/files/2014/04/CDT_PCLOB-702-Comments_4.11.13.pdf C. Collection of communications “about” targets that are neither to nor from targets should be prohibited . The Government takes the position that Section 702 permits it to collect not only communications that are to or from a foreign intelligence target, but also communications that are “about” the target because they mention an identifier associated with the target.17 The practice directs the focus of surveillance away from suspected wrongdoers and permits the NSA to target communications between individuals with no link to national security investigations. Because this is inconsistent with the legislative history of the statute, and raises profound constitutional and operational problems, PCLOB should recommend that “about” collection be ended, and that Section 702 surveillance be limited to communications to and from targets. Section 702 authorizes the government to target the communications of persons reasonably believed to be abroad, but it never defines the term “target.” However, throughout Section 702, the term is used to refer to the targeting of an individual rather content of a communication.18 Further, the entire congressional debate on Section 702 includes no reference to collecting communications “about” a foreign target, and significant debate about collecting communications to or from a target.19 To collect “about” communications, the NSA engages in “upstream” surveillance on the Internet backbone,20 meaning “on fiber cables and infrastructure as data flows past,”21 temporarily copying the content of the entire data stream so it can be searched for the same “selectors” used for the downstream or “PRISM” surveillance. As a result, the NSA has the capability to search any Internet communication going into or out of the U.S.22 without particularized intervention by a provider. Direct access creates direct opportunity for abuse, and should not be permitted to a military intelligence agency. This dragnet scanning also results in the collection of “multi-communication transactions,” (MCTs) which include tens of thousands wholly domestic communications each year.23 The FISC required creation of new minimization rules for MCTs in 2011, but did not limit their collection.24 The mass searching of communications content inside the United States, knowing that it the communications searched include tens of thousands of wholly domestic communications each year, raises profound constitutional questions. Abandoning collection of communications “about” targets would remove any justification for upstream collection, eliminate the serious problems posed by direct government access to the Internet infrastructure, eliminate the collection of tens of thousands of wholly domestic communications in contravention of the statute, an make surveillance under Section 702 consistent with the congressional intent. 19/92 NSA Affirmative 1st Affirmative Constructive NAUDL 2015-16 NSA 1AC (Long Version) (6/18) 4. These limits restore US leadership on privacy and rights issues. Edgar, visiting scholar at the Brown University’s Watson Institute for International Studies, 2015 Timothy H, 4-13-2015, "The Good News About Spying," Foreign Affairs, https://www.foreignaffairs.com/articles/united-states/2015-04-13/good-news-about-spying The United States should also pivot from its defensive position and take the lead on global privacy. The United States has an impressive array of privacy safeguards, and it has even imposed new ones that protect citizens of every country. Despite their weaknesses, these safeguards are still the strongest in the world. The U.S. government should not be shy about trumpeting them, and should urge other countries to follow its lead. It could begin by engaging with close allies, like the United Kingdom, Germany, and other European countries, urging them to increase transparency and judicial supervision of their own communications surveillance activities. 5. Finally, the plan is a critical step to fight the politics of fear and regain privacy rights. Snowden, director of the Freedom of the Press Foundation. 2015, (Edward J, . 6-4-2015, "Edward Snowden: The World Says No to Surveillance," New York Times, http://www.nytimes.com/2015/06/05/opinion/edward-snowden-theworld-says-no-to-surveillance.html) Though we have come a long way, the right to privacy — the foundation of the freedoms enshrined in the United States Bill of Rights — remains under threat. Some of the world’s most popular online services have been enlisted as partners in the N.S.A.’s mass surveillance programs, and technology companies are being pressured by governments around the world to work against their customers rather than for them. Billions of cellphone location records are still being intercepted without regard for the guilt or innocence of those affected. We have learned that our government intentionally weakens the fundamental security of the Internet with “back doors” that transform private lives into open books. Metadata revealing the personal associations and interests of ordinary Internet users is still being intercepted and monitored on a scale unprecedented in history: As you read this online, the United States government makes a note. Spymasters in Australia, Canada and France have exploited recent tragedies to seek intrusive new powers despite evidence such programs would not have prevented attacks. Prime Minister David Cameron of Britain recently mused, “Do we want to allow a means of communication between people which we cannot read?” He soon found his answer, proclaiming that “for too long, we have been a passively tolerant society, saying to our citizens: As long as you obey the law, we will leave you alone.” At the turning of the millennium, few imagined that citizens of developed democracies would soon be required to defend the concept of an open society against their own leaders. Yet the balance of power is beginning to shift. We are witnessing the emergence of a post-terror generation, one that rejects a worldview defined by a singular tragedy. For the first time since the attacks of Sept. 11, 2001, we see the outline of a politics that turns away from reaction and fear in favor of resilience and reason. With each court victory, with every change in the law, we demonstrate facts are more convincing than fear. As a society, we rediscover that the value of a right is not in what it hides, but in what it protects. 20/92 NSA Affirmative 1st Affirmative Constructive NAUDL 2015-16 NSA 1AC (Long Version) (7/18) Advantage One is Privacy 1. Surveillance under Section 702 is a substantial invasion of privacy because of the broad targeting guidelines in the FISA Amendments Act. Laperruque, Fellow on Privacy, Surveillance, and Security at Center for Democracy and Technology, 2014, (Jake, "Why Average Internet Users Should Demand Significant Section 702 Reform," Center For Democracy & Technology., 7-22-2014, https://cdt.org/blog/why-average-internet-users-should-demand-significant-section-702-reform/ Section 702 Surveillance Is Fundamentally More Invasive While incidental collection of the communications of a person who communicates with a target is an inevitable feature of communications surveillance, it is tolerated In other instances of communications surveillance conducted in the US, surveillance requires court approval of a target, and that target must be a suspected wrongdoer or spy, a terrorist, or another agent of a foreign power. Section 702 requires neither of these elements. when the reason for the surveillance is compelling and adequate procedural checks are in place. Under Section 702, targeting can occur for the purpose of collecting foreign intelligence information even though there is no court review of any particular target. Instead, the super secret FISA court merely determines whether the guidelines under which the surveillance is conducted are reasonably designed to result in the targeting of non-Americans abroad and that “minimization guidelines” are This means incidental surveillance may occur purely because someone communicated with an individual engaged in activities that may have broadly defined “foreign intelligence” value. For example, the communications of someone who communicates with a person abroad whose activities might relate to the conduct of U.S. foreign affairs can be collected, absent any independent assessment of necessity or accuracy. reasonable. As another example, under traditional FISA – for intelligence surveillance in the U.S. of people in the U.S. – your communications could be incidentally collected only if you were in direct contact with a suspected agent of a foreign power, and additionally if the Foreign Intelligence Surveillance Court had affirmed this suspicion based Under Section 702, your personal information could be scooped up by the NSA simply because your attorney, doctor, lover, or accountant was a person abroad who engaged in peaceful political activity such as protesting a G8 summit. on probable cause. 2. Indiscriminate wide-scale NSA Surveillance erodes privacy rights and violates the constitution Sinha, Fellow at Human Rights Watch, 2014 (G. Alex July 2014 “With Liberty to Monitor All How Large-Scale US Surveillance is Harming Journalism, Law, and American Democracy” Human Rights Watch, http://www.hrw.org/node/127364) The questions raised by surveillance are complex. The government has an obligation to protect national security, and in some cases, it is legitimate for government to restrict certain rights to that end. At the same time, international human rights and constitutional law set limits on the state’s authority to engage in activities like surveillance, which have the potential to undermine so many other rights. The current, large-scale, often indiscriminate US approach to surveillance carries enormous costs. It erodes global digital privacy and sets a terrible example for other countries like India, Pakistan, Ethiopia, and others that are in the process of expanding their surveillance capabilities. It also damages US credibility in advocating internationally for internet freedom, which the US has listed as an important foreign policy objective since at least 2010.As this report documents, US surveillance programs are also doing damage to some of the values the United States claims to hold most dear. These include freedoms of expression and association, press freedom, and the right to counsel, which are all protected by both international human rights law and the US Constitution. 21/92 NSA Affirmative 1st Affirmative Constructive NAUDL 2015-16 NSA 1AC (Long Version) (8/18) 3. These privacy violations are more dangerous than any risk of terrorism Schneier, fellow at the Berkman Center for Internet and Society at Harvard Law School, 2014 Bruce 1-6-2014, "Essays: How the NSA Threatens National Security," Schneier On Security, https://www.schneier.com/essays/archives/2014/01/how_the_nsa_threaten.html We have no evidence that any of this surveillance makes us safer. NSA Director General Keith Alexander responded to these stories in June by claiming that he disrupted 54 terrorist plots. In October, he revised that number downward to 13, and then to "one or two." At this point, the only "plot" prevented was that of a San Diego man sending $8,500 to support a Somali militant group. We have been repeatedly told that these surveillance programs would have been able to stop 9/11, yet the NSA didn't detect the Boston bombings—even though one of the two terrorists was on the watch list and the other had a sloppy social media trail. Bulk collection of data and metadata is an ineffective counterterrorism tool. Not only is ubiquitous surveillance ineffective, it is extraordinarily costly. I don't mean just the budgets, which will continue to skyrocket. Or the diplomatic costs, as country after country learns of our surveillance programs against their citizens. I'm also talking about the cost to our society. It breaks so much of what our society has built. It breaks our political systems, as Congress is unable to provide any meaningful oversight and citizens are kept in the dark about what government does. It breaks our legal systems, as laws are ignored or reinterpreted, and people are unable to challenge government actions in court. It breaks our commercial systems, as U.S. computer products and services are no longer trusted worldwide. It breaks our technical systems, as the very protocols of the Internet become untrusted. And it breaks our social systems; the loss of privacy, freedom, and liberty is much more damaging to our society than the occasional act of random violence. And finally, these systems are susceptible to abuse. This is not just a hypothetical problem. Recent history illustrates many episodes where this information was, or would have been, abused: Hoover and his FBI spying, McCarthy, Martin Luther King Jr. and the civil rights movement, anti-war Vietnam protesters, and—more recently—the Occupy movement. Outside the U.S., there are even more extreme examples. Building the surveillance state makes it too easy for people and organizations to slip over the line into abuse. 22/92 NSA Affirmative 1st Affirmative Constructive NAUDL 2015-16 NSA 1AC (Long Version) (9/18) 4. The First impact is the loss of personal autonomy and agency. Privacy is a gateway right, it enables all of our other freedoms. PoKempne, General Counsel at Human Rights Watch, 2014, (Dinah, , “The Right Whose Time Has Come (Again): Privacy in the Age of Surveillance” 1/21/14 http://www.hrw.org/world-report/2014/essays/privacy-in-age-ofsurveillance) Technology has invaded the sacred precincts of private life, and unwarranted exposure has imperiled our security, dignity, and most basic values. The law must rise to the occasion and protect our rights. Does this sound familiar? So argued Samuel Warren and Louis Brandeis in their 1890 Harvard Law Review article announcing “The Right to Privacy.” We are again at such a juncture. The technological developments they saw as menacing—photography and the rise of the mass circulation press—appear rather quaint to us now. But the harms to emotional, psychological, and even physical security from unwanted exposure seem just as vivid in our digital age.Our renewed sense of vulnerability comes as almost all aspects of daily social life migrate online . At the same time, corporations and governments have acquired frightening abilities to amass and search these endless digital records, giving them the power to “know” us in extraordinary detail. In a world where we share our lives on social media and trade immense amounts of personal information for the ease and convenience of online living, some have questioned whether privacy is a relevant concept. It is not just relevant, but crucial. privacy is a gateway right that affects our ability to exercise almost every other right, not least our freedom to speak and associate with those we choose, make political choices, practice our religious beliefs, seek medical help, access education, figure out whom we love, and create our family life. It is nothing less than the shelter in which we work out what we think and who we are; a fulcrum of our autonomy as individuals. Indeed, The importance of privacy, a right we often take for granted, was thrown into sharp relief in 2013 by the steady stream of revelations from United States government files released by former National Security Agency (NSA) contractor Edward Snowden, and published in the Guardian and other major newspapers around the world . These revelations, supported by highly classified documents, showed the US, the UK, and other governments engaged in global indiscriminate data interception, largely unchecked by any meaningful legal constraint or oversight, without regard for the rights of millions of people who were not suspected of wrongdoing. 23/92 NSA Affirmative 1st Affirmative Constructive NAUDL 2015-16 NSA 1AC (Long Version) (10/18) 5. The Second impact is Totalitarianism, the loss of autonomy due to surveillance enables “turnkey totalitarianism,” destroying democracy. Haggerty, Professor of Criminology and Sociology at the University of Alberta, 2015 Kevin D., “What’s Wrong with Privacy Protections?” in A World Without Privacy: What Law Can and Should Do? Edited by Austin Sarat p. 230 emphasis on the threat of authoritarian forms of rule inherent in populations open to detailed institutional scrutiny will be portrayed as overblown and over dramatic, suggesting I veer towards the lunatic fringe of unhinged conspiracy theorists.66 But one does not have to believe secret forces are operating behind the scenes to recognize that our declining private realm presents alarming dangers. Someone as conservative and deeply embedded in the security establishment as William Binney – a former NSA senior executive – says the security surveillance infrastructure he helped build now puts us on the verge of “turnkey totalitarianism.”67 Still others will say I am being alarmist. My The contemporary expansion of surveillance, where monitoring becomes an ever-more routine part of our lives, represents a tremendous shift in the balance of power between citizens and organizations. Perhaps the greatest danger of this situation is how our existing surveillance practices can be turned to oppressive uses. From this point forward our expanding surveillance infrastructure stands as a resource to be inherited by future generations of politicians, corporate actors, or even messianic leaders. Given sufficient political will this surveillance infrastructure can be repurposed to monitor – in unparalleled detail – people who some might see as undesirable due to their political opinions, religion, skin color, gender, birthplace, physical abilities, medical history, or any number of an almost limitless list of factors used to pit people against one another. The twentieth century provides notorious examples of such repressive uses of surveillance. Crucially, those tyrannical states exercised fine-grained political control by relying on surveillance infrastructures that today seem laughably rudimentary, comprised as they were of paper files, index cards, and elementary telephone tapping.68 It is no more alarmist to acknowledge such risks are germane to our own societies than it is to recognize the future will see wars, terrorist attacks, or environmental disasters – events that could themselves prompt surveillance structures to be re-calibrated towards more coercive ends. Those who think this massive surveillance infrastructure will not, in the fullness of time, be turned to repressive purposes are either innocent as to the realities of power, or whistling past a graveyard. But one does not have to dwell on the most extreme possibilities to be unnerved by how enhanced surveillance capabilities invest tremendous powers in organizations. Surveillance capacity gives organizations unprecedented abilities to manipulate human behaviors, desires, and subjectivities towards organizational ends – ends that are too often focused on profit, personal aggrandizement, and institutional self-interest rather than human betterment. 24/92 NSA Affirmative 1st Affirmative Constructive NAUDL 2015-16 NSA 1AC (Long Version) (11/18) 6. Freedom and dignity are ethically prior to security. Cohen, Ph.D., ethicist and political analyst, 2014 (Elliot D.. Technology of Oppression: Preserving Freedom and Dignity in an Age of Mass, Warrantless Surveillance.. DOI: 10.1057/9781137408211.0011. ) The threat posed by mass, warrantless surveillance technologies Presently, such a threat to human freedom and dignity lies in the technological erosion of human privacy through the ever-evolving development and deployment of a global, government system of mass, warrantless surveillance. Taken to its logical conclusion, this is a systematic means of spying on, and ultimately manipulating and controlling, virtually every aspect of everybody's private life—a thoroughgoing, global dissolution of personal space, which is supposed to be legally protected. In such a governmental state of "total (or virtually total) information awareness," the potential for government control and manipulation of the people's deepest and most personal beliefs, feelings, and values can transform into an Orwellian reality—and nightmare. As will be discussed in Chapter 6, the technology that has the potential to remove such scenarios from the realm of science fiction to that of true science is currently the exceptional disruption of privacy for legitimate state reasons cannot and should not be mistaken for a usual and customary rule of mass invasion of people's private lives without their informed consent. Benjamin Franklin wisely and succinctly expressed the point: "Those who surrender freedom for security will not have, nor do they deserve, either one." In relinquishing our privacy to government, we also lose the freedom to control, and act on, our personal information, which is what defines us individually, and collectively, as free agents and a free nation. In a world devoid of freedom to control who we are, proclaiming that we are "secure" is an empty platitude. being developed. This is not to deny the legitimate government interest in "national security"; however, 25/92 NSA Affirmative 1st Affirmative Constructive NAUDL 2015-16 NSA 1AC (Long Version) (12/18) Advantage Two is the Economy. 1. NSA surveillance has put the US economy at risk because of losses in the technology sector. Mindock, Reporting Fellow at International Business Times – Internally quoting The Information Technology and Innovation Foundation. ITIF is a non-partisan research and educational institute, 2015 (Clark “NSA Surveillance Could Cost Billions For US Internet Companies After Edward Snowden Revelations” - International Business Times - June 10 2015 http://www.ibtimes.com/nsa-surveillance-could-cost-billions-us-internet-companies-after-edward-snowden-1959737) Failure to reform National Security Administration spying programs revealed by Edward Snowden could be more economically taxing than previously thought, says a new study published by the Information Technology and Innovation Foundation Tuesday. The study suggests the programs could be affecting the technology sector as a whole, not just the cloud-computing sector, and that the costs could soar much higher than previously expected. Even modest declines in cloud computing revenues from the revealed surveillance programs, according to a previous report, would cost between $21.5 billion and $35 billion by 2016. New estimates show that the toll “will likely far exceed ITIF’s initial $35 billion estimate.” “The U.S. government’s failure to reform many of the NSA’s surveillance programs has damaged the competitiveness of the U.S. tech sector and cost it a portion of the global market share,” a summary of the report said. Revelations by defense contractor Snowden in June 2013 exposed massive U.S. government surveillance capabilities and showed the NSA collected American phone records in bulk, and without a warrant. The bulk phone-record revelations, and many others in the same vein, including the required complacency of American telecom and Internet companies in providing the data, raised questions about the transparency of American surveillance programs and prompted outrage from privacy advocates. The study, published this week, argues that unless the American government can vigorously reform how NSA surveillance is regulated and overseen, U.S. companies will lose contracts and, ultimately, their competitive edge in a global market as consumers around the world choose cloud computing and technology options that do not have potential ties to American surveillance programs. The report comes amid a debate in Congress on what to do with the Patriot Act, the law that provides much of the authority for the surveillance programs. As of June 1, authority to collect American phone data en masse expired, though questions remain as to whether letting that authority expire is enough to protect privacy. Supporters of the programs argue that they provide the country with necessary capabilities to fight terrorism abroad. A further reform made the phone records collection process illegal for the government, and instead gave that responsibility to the telecom companies. 26/92 NSA Affirmative 1st Affirmative Constructive NAUDL 2015-16 NSA 1AC (Long Version) (13/18) 2. Reform is necessary to regain US leadership in the global marketplace. Castro and Mcquinn, Director of the Center for Data Innovation and Research Assistant, 2015 (Daniel & Alan, 6/9/15, “Beyond the USA Freedom Act: How U.S. Surveillance Still Subverts U.S. Competitiveness” “Information Technology & Innovation Foundation” http://www.itif.org/publications/2015/06/09/beyond-usa-freedom-act-how-us-surveillance-still-subverts-us-competitiveness When historians write about this period in U.S. history it could very well be that one of the themes will be how the United States lost its global technology leadership to other nations. And clearly one of the factors they would point to is the long-standing privileging of U.S. national security interests over U.S. industrial and commercial interests when it comes to U.S. foreign policy. This has occurred over the last few years as the U.S. government has done relatively little to address the rising commercial challenge to U.S. technology companies, all the while putting intelligence gathering first and foremost. Indeed, policy decisions by the U.S. intelligence community have reverberated throughout the global economy. If the U.S. tech industry is to remain the leader in the global marketplace, then the U.S. government will need to set a new course that balances economic interests with national security interests. The cost of inaction is not only short-term economic losses for U.S. companies, but a wave of protectionist policies that will systematically weaken U.S. technology competiveness in years to come, with impacts on economic growth, jobs, trade balance, and national security through a weakened industrial base. Only by taking decisive steps to reform its digital surveillance activities will the U.S. government enable its tech industry to effectively compete in the global market. 3. The US is the driving force behind global economic recovery Economist 2015 “American shopper,” 2-14, http://www.economist.com/news/leaders/21643188-world-once-again-relying-too-much-american-consumerspower-growth-american-shopper A Global economy running on a single engine is better than one that needs jump leads. The American economy is motoring again, to the relief of exporters from Hamburg to Hangzhou. Firms added more than 1m net new jobs in the past three months, the best showing since 1997 (see article). Buoyed up by cheap petrol, Americans are spending; in January consumer sentiment jumped to its highest in more than a decade. The IMF reckons that American growth will hit 3.6% in 2015, faster than the world economy as a whole. All this is good. But growing dependence on the American economy—and on consumers in particular—has unwelcome echoes. A decade ago American consumers borrowed heavily and recklessly. They filled their ever-larger houses with goods from China; they fuelled gas-guzzling cars with imported oil. Big exporters recycled their earnings back to America, pushing down interest rates which in turn helped to feed further borrowing. Europe was not that different. There, frugal Germans financed debt binges around the euro area’s periphery.After the financial crisis, the hope was of an end to these imbalances. Debtaddicted Americans and Spaniards would chip away at their obligations; thrifty German and Chinese consumers would start to enjoy life for once. At first, this seemed to be happening. America’s trade deficit, which was about 6% of GDP in 2006, had more than halved by 2009. But now the world is slipping back into some nasty habits. Hair grows faster than the euro zone, and what growth there is depends heavily on exports. The countries of the single currency are running a current-account surplus of about 2.6% of GDP, thanks largely to exports to America. At 7.4% of GDP, Germany’s trade surplus is as large as it has ever been. China’s growth, meanwhile, is slowing—and once again relying heavily on spending elsewhere. It notched up its own record trade surplus in January. China’s exports have actually begun to drop, but imports are down by more. And over the past year the renminbi, which rose by more than 10% against the dollar in 2010-13, has begun slipping again, to the annoyance of American politicians. America’s economy is warping as a result. Consumption’s contribution to growth in the fourth quarter of 2014 was the largest since 2006. The trade deficit is widening. Strip out oil, and America’s trade deficit grew to more than 3% of GDP in 2014, and is approaching its pre-recession peak of about 4%. The world’s reliance on America is likely to deepen. Germans are more interested in shipping savings abroad than investing at home (see article). Households and firms in Europe’s periphery are overburdened with debt, workers’ wages squeezed and banks in no mood to lend. Like Germany, Europe as a whole is relying on exports. China is rebalancing, but not fast enough: services have yet to account for more than half of annual Chinese output. 27/92 NSA Affirmative 1st Affirmative Constructive NAUDL 2015-16 NSA 1AC (Long Version (14/18) 4. The impact of economic decline is great power war. James, Professor of History at Princeton, 2014 (Harold, “Debate: Is 2014, like 1914, a prelude to world war?”, 7-2, http://www.theglobeandmail.com/globedebate/read-and-vote-is-2014-like-1914-a-prelude-to-world-war/article19325504/) Some of the dynamics of the pre-1914 financial world are now re-emerging. Then an economically declining power, Britain, wanted to use finance as a weapon against its larger and faster growing competitors, Germany and the United States. Now America is in turn obsessed by being overtaken by China – according to some calculations, set to become the world’s largest economy in 2014. In the aftermath of the 2008 financial crisis, financial institutions appear both as dangerous weapons of mass destruction, but also as potential instruments for the application of national power. In managing the 2008 crisis, the dependence of foreign banks on U.S. dollar funding constituted a major weakness, and required the provision of large swap lines by the Federal Reserve. The United States provided that support to some countries, but not others, on the basis of an explicitly political logic, as Eswar Prasad demonstrates in his new book on the “Dollar Trap.” Geo-politics is intruding into banking practice elsewhere. Before the Ukraine crisis, Russian banks were trying to acquire assets in Central and Eastern Europe. European and U.S. banks are playing a much reduced role in Asian trade finance. Chinese banks are being pushed to expand their role in global commerce. After the financial crisis, China started to build up the renminbi as a major international currency. Russia and China have just proposed to create a new credit rating agency to avoid what they regard as the political bias of the existing (American-based) agencies. The next stage in this logic is to think about how financial power can be directed to national advantage in the case of a diplomatic tussle. Sanctions are a routine (and not terribly successful) part of the pressure applied to rogue states such as Iran and North Korea. But financial pressure can be much more powerfully applied to countries that are deeply embedded in the world economy. The test is in the Western imposition of sanctions after the Russian annexation of Crimea. President Vladimir Putin’s calculation in response is that the European Union and the United States cannot possibly be serious about the financial war. It would turn into a boomerang: Russia would be less affected than the more developed and complex financial markets of Europe and America. The threat of systemic disruption generates a new sort of uncertainty, one that mirrors the decisive feature of the crisis of the summer of 1914. At that time, no one could really know whether clashes would escalate or not. That feature contrasts remarkably with almost the entirety of the Cold War, especially since the 1960s, when the strategic doctrine of Mutually Assured Destruction left no doubt that any superpower conflict would inevitably escalate. The idea of network disruption relies on the ability to achieve advantage by surprise, and to win at no or low cost. But it is inevitably a gamble, and raises prospect that others might, but also might not be able to, mount the same sort of operation. Just as in 1914, there is an enhanced temptation to roll the dice, even though the game may be fatal. 28/92 NSA Affirmative 1st Affirmative Constructive NAUDL 2015-16 NSA 1AC (Long Version) (15/18) Advvantage 3 is Internet Freedom 1. NSA spying has undermined American foreign policy. It undercut any credibility to push for democratic freedom in repressive regimes, repressive surveillance is growing worldwide as a result. Schneier, fellow at the Berkman Center for Internet and Society at Harvard Law School 2015 (Bruce, Inc 3/2/15, Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. P. 106) In 2010, then secretary of state Hillary Clinton gave a speech declaring Internet freedom a major US foreign policy goal. To this end, the US State Department funds and supports a variety of programs worldwide, working to counter censorship, promote encryption, and enable anonymity, all designed "to ensure that any child, born anywhere in the world, has access to the global Internet as an open platform on which to innovate, learn, organize, and express herself free from undue interference or censorship." This agenda has been torpedoed by the awkward realization that the US and other democratic governments conducted the same types of surveillance they have criticized in more repressive countries. Those repressive countries are seizing on the opportunity, pointing to US surveillance as a justification for their own more draconian Internet policies: more surveillance, more censorship, and a more isolationist Internet that gives individual countries more control over what their citizens see and say . For example, one of the defenses the government of Egypt offered for its plans to monitor social media was that "the US listens in to phone calls, and supervises anyone who could threaten its national security." Indians are worried that their government will cite the US's actions to justify surveillance in that country. Both China and Russia publicly called out US hypocrisy. This affects Internet freedom worldwide. Historically, Internet governance—what little there was—was largely left to the United States, because everyone more or less believed that we were working for the security of the Internet instead of against it. But now that the US has lost much of its credibility, Internet governance is in turmoil. Many of the regulatory bodies that influence the Internet are trying to figure out what sort of leadership model to adopt. Older international standards organizations like the International Telecommunications Union are trying to increase their influence in Internet governance and develop a more nationalist set of rules. This is the cyber sovereignty movement, and it threatens to fundamentally fragment the Internet. It's not new, but it has been given an enormous boost from the revelations of NSA spying. Countries like Russia, China, and Saudi Arabia are pushing for much more autonomous control over the portions of the Internet within their borders. 29/92 NSA Affirmative 1st Affirmative Constructive NAUDL 2015-16 NSA 1AC (Long Version) (16/18) 2. This hypocrisy created the conditions that will accelerate the global rise of authoritarianism. Chenoweth & Stephan, political scientist at the University of Denver & Senior Policy Fellow at the U.S. Institute of Peace, 2015 (Erica,.& Maria J, , 7- 7-2015, "How Can States and Non-State Actors Respond to Authoritarian Resurgence?," Political Violence @ a Glance, http://politicalviolenceataglance.org/2015/07/07/how-can-states-and-non-state-actors-respond-to-authoritarian-resurgence/ Chenoweth: Why is authoritarianism making a comeback? Stephan: There’s obviously no single answer to this. But part of the answer is that democracy is losing its allure in parts of the world. When people don’t see the economic and governance benefits of democratic transitions, they lose hope. Then there’s the compelling “stability first” argument. Regimes around the world, including China and Russia, have readily cited the “chaos” of the Arab Spring to justify heavy-handed policies and consolidating their grip on power. The “color revolutions” that toppled autocratic regimes in Serbia, Georgia, and Ukraine inspired similar dictatorial retrenchment. There is nothing new about authoritarian regimes adapting to changing circumstances. Their resilience is reinforced by a combination of violent and non-coercive measures. But authoritarian paranoia seems to have grown more piqued over the past decade. Regimes have figured out that “people power” endangers their grip on power and they are cracking down. There’s no better evidence of the effectiveness of civil resistance than the measures that governments take to suppress it—something you detail in your chapter from my new book. Finally, and importantly, democracy in this country and elsewhere has taken a hit lately. Authoritarian regimes mockingly cite images of torture, mass surveillance, and the catering to the radical fringes happening in the US political system to refute pressures to democratize themselves. The financial crisis here and in Europe did not inspire much confidence in democracy and we are seeing political extremism on the rise in places like Greece and Hungary. Here in the US we need to get our own house in order if we hope to inspire confidence in democracy abroad. 30/92 NSA Affirmative 1st Affirmative Constructive NAUDL 2015-16 NSA 1AC (Long Version) (17/18) 3. American surveillance is the primary driver behind this authoritarian acceleration. Curtailing the surveillance of the NSA is necessary to restore US credibility. Jackson, M.A. from the University of Chicago’s Committee on International Relations 2015 (Dean, 7-14-2015, "The Authoritarian Surge into Cyberspace," International Forum For Democratic Studies, http://www.resurgentdictatorship.org/the-authoritarian-surge-into-cyberspace/) This still leaves open the question of what is driving authoritarian innovation in cyberspace. Deibert identifies increased government emphasis on cybersecurity as one driver: cybercrime and terrorism are serious concerns, and governments have a legitimate interest in combatting them. Unfortunately, when democratic governments use mass surveillance and other tools to police cyberspace, it can have the effect of providing cover for authoritarian regimes to use similar techniques for repressive purposes—especially, as Deibert notes, since former NSA contractor Edward Snowden’s disclosure of US mass surveillance programs. Second, Deibert observes that authoritarian demand for cybersecurity technology is often met by private firms based in the democratic world—a group that Reporters Without Borders (RSF) calls the “Corporate Enemies of the Internet.” Hacking Team, an Italian firm mentioned in the RSF report, is just one example: The Guardian reports that leaked internal documents suggest Hacking Team’s clients include the “in a world where ‘Big Brother’ and ‘Big Data’ share so many of the same needs, the political economy of cybersecurity must be singled out as a major driver of resurgent authoritarianism in cyberspace.” governments of “Azerbaijan, Kazakhstan, Uzbekistan, Russia, Bahrain, Saudi Arabia, and the United Arab Emirates.” Deibert writes that Given these powerful forces, it will be difficult to reverse the authoritarian surge in cyberspace. Deibert offers some possible solutions: for starters, he writes that the “political economy of cybersecurity” can be altered through stronger export controls, “smart sanctions,” and a monitoring system to detect abuses. Further, he recommends that cybersecurity trade fairs open their doors to civil society watchdogs who can help hold governments and the private sector accountable. Similarly, Deibert suggests that opening regional cybersecurity initiatives to civil society participation could mitigate violations of user rights. This might seem unlikely to occur within some authoritarian-led intergovernmental organizations, but setting a normative expectation of civil society participation might help discredit the efforts of bad actors. Deibert concludes with a final recommendation that society develop “models of cyberspace security that can show us how to prevent disruptions or threats to life and property without sacrificing liberties and rights.” This might restore democratic states to the moral high ground and remove oppressive regimes’ rhetorical cover, but developing such models will require confronting powerful vested interests and seriously examining the tradeoff between cybersecurity and Internet freedom. Doing so would be worth it: the Internet is far too important to cede to authoritarian control. 31/92 NSA Affirmative 1st Affirmative Constructive NAUDL 2015-16 NSA 1AC (Long Version) (18/18) 4. The spread of democracy prevents nuclear war. Sharansky, Israel’s Minister for Jerusalem and Diaspora Affair, 2004, (Nathan, The Case for Democracy, p. 88 Now we can see why nondemocratic regimes imperil the security of the world. They stay in power by controlling their populations. This control invariably requires an increasing amount of repression. To justify this repression and maintain internal stability, external enemies must be manufactured. The result is that while the mechanics of democracy make democracies inherently peaceful, the mechanics of tyranny make nondemocracies inherently beliligerent. Indeed, in order to avoid collapsing from within, fear societies must maintain a perpetual state of conflict. Nondemocratic societies have always been powder kegs ready to explode, but today the force of that explosion can be far more lethal than it was in the past. In an age of weapons of mass destruction and global terrorism, the dangers of ignoring the absence of democracy in any part of the world have increased dramatically. For a half century, the totalitarian regime in Pyongyang has threatened the security of South Korea. Once it developed long-range missiles, it threatened the security of neighboring Japan and endangered other countries with the proliferation of ballistic missile technology. Now that Pyongyang has reportedly developed nuclear weapons— weapons that can be provided to international terrorist organizations—it endangers the security of the entire world. The threat posed by North Korea is not a function of the increase of the destructive capacity of its weapons. Rather, it is the enhanced capacity of its weapons coupled with the nature of its regime that is the source of the problem. Just as nuclear weapons in the hands of a democratizing Russia do not pose the same threat as they did in the hands of the Soviet Union, the weapons of a democratic North Korea would pose no greater danger to the world than if they would be in the hands of a democratic South Korea. In the hands of leaders whose power is dependent on people who see war as a last resort, weapons of mass destruction will be a weapon of last resort. But in the hands of leaders whose survival depends on maintaining a constant state of tension, the danger of these weapons being used directly, or via terrorist proxies, increases enormously. That is not to say that nondemocratic regimes will never sign peace agreements. From time to time, if it suits their interests, they will. But we must remember that for these regimes, the decision to wage war or make peace is not based upon its impact on the public welfare but on whether it strengthens the regime’s control. To democratic governments, whose power is ultimately dependent on the popular will, peace is always an interest. To nondemocratic regimes, peace and war are merely interchangeable methods of subjugation. One day staying in power will necessitate making peace. The next, it will necessitate waging war. That is why a genuine and lasting peace can only be made with democracies. 32/92 NSA Affirmative Privacy Advantage SLUDL/NAUDL 2015-16 Answers to NSA not Invasive (___) (__) Section 702 is a unique invasion of privacy, incidental collection is extremely broad and poorly defined. Laperruque, Fellow on Privacy, Surveillance, and Security at Center for Democracy and Technology, 2014, (Jake, "Why Average Internet Users Should Demand Significant Section 702 Reform," Center For Democracy & Technology., 7-22-2014, https://cdt.org/blog/why-average-internet-users-should-demand-significantsection-702-reform/ Section 702 Surveillance Is Fundamentally More Invasive While incidental collection of the communications of a person who communicates with a target is an inevitable feature of communications surveillance, it is tolerated when the reason for the surveillance is compelling and adequate procedural checks are in place. In other instances of communications surveillance conducted in the US, surveillance requires court approval of a target, and that target must be a suspected wrongdoer or spy, a terrorist, or another agent of a foreign power. Section 702 requires neither of these elements. Under Section 702, targeting can occur for the purpose of collecting foreign intelligence information even though there is no court review of any particular target. Instead, the super secret FISA court merely determines whether the guidelines under which the surveillance is conducted are reasonably designed to result in the targeting of non-Americans abroad and that “minimization guidelines” are reasonable. This means incidental surveillance may occur purely because someone communicated with an individual engaged in activities that may have broadly defined “foreign intelligence” value. For example, the communications of someone who communicates with a person abroad whose activities might relate to the conduct of U.S. foreign affairs can be collected, absent any independent assessment of necessity or accuracy. As another example, under traditional FISA – for intelligence surveillance in the U.S. of people in the U.S. – your communications could be incidentally collected only if you were in direct contact with a suspected agent of a foreign power, and additionally if the Foreign Intelligence Surveillance Court had affirmed this suspicion based on probable cause. Under Section 702, your personal information could be scooped up by the NSA simply because your attorney, doctor, lover, or accountant was a person abroad who engaged in peaceful political activity such as protesting a G8 summit. 33/92 NSA Affirmative Privacy Advantage SLUDL/NAUDL 2015-16 Answers to NSA not Invasive (___) (___) NSA programs can access online user accounts and personal communication across the globe. Gellman, Washington Post Staff Write, 2014 Barton 7-5-2014, "In NSA-intercepted data, those not targeted far outnumber the foreigners who are," Washington Post, https://www.washingtonpost.com/world/national-security/in-nsa-intercepted-data-those-nottargeted-far-outnumber-the-foreigners-who-are/2014/07/05/ Many other files, described as useless by the analysts but nonetheless retained, have a startlingly intimate, even voyeuristic quality. They tell stories of love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions, financial anxieties and disappointed hopes. The daily lives of more than 10,000 account holders who were not targeted are catalogued and recorded nevertheless. In order to allow time for analysis and outside reporting, neither Snowden nor The Post has disclosed until now that he obtained and shared the content of intercepted communications. The cache Snowden provided came from domestic NSA operations under the broad authority granted by Congress in 2008 with amendments to the Foreign Intelligence Surveillance Act. FISA content is generally stored in closely controlled data repositories, and for more than a year, senior government officials have depicted it as beyond Snowden’s reach.The Post reviewed roughly 160,000 intercepted e-mail and instantmessage conversations, some of them hundreds of pages long, and 7,900 documents taken from more than 11,000 online accounts. The material spans President Obama’s first term, from 2009 to 2012, a period of exponential growth for the NSA’s domestic collection. Taken together, the files offer an unprecedented vantage point on the changes wrought by Section 702 of the FISA amendments, which enabled the NSA to make freer use of methods that for 30 years had required probable cause and a warrant from a judge. One program, code-named PRISM, extracts content stored in user accounts at Yahoo, Microsoft, Facebook, Google and five other leading Internet companies. Another, known inside the NSA as Upstream, intercepts data on the move as it crosses the U.S. junctions of global voice and data networks. No government oversight body, including the Justice Department, the Foreign Intelligence Surveillance Court, intelligence committees in Congress or the president’s Privacy and Civil Liberties Oversight Board, has delved into a comparably large sample of what the NSA actually collects — not only from its targets but also from people who may cross a target’s path. 34/92 NSA Affirmative Privacy Advantage SLUDL/NAUDL 2015-16 Answer to Privacy Invasions Inevitable (___) (__) Privacy is not dead, its just complex – we need to figure out the balance. Richards, Professor of Law, Washington University. 2015, Neil M., “Four Privacy Myths” Revised form, "A World Without Privacy?" (Cambridge Press, Austin Sarat, ed. 2015), Forthcoming. Available at SSRN: http://ssrn.com/abstract=2427808 My purpose in these examples is not to pick on these organizations. On the contrary, when used appropriately, privacy rules like trade and government secret protection can advance important social interests. I am trying instead to make a point that is easy to overlook: When the very entities that are used as examplars of the “Death of Privacy” use suites of robust legal tools to preserve their own privacy, it makes no sense to claim that privacy is dead. On the contrary, these examples show that privacy is a complex phenomenon, and that we should be talking about the balance between different kinds of privacies and different rules for managing flows of information rather than privacy’s demise. When viewed from this perspective, neither Facebook nor the NSA reject privacy; on the contrary, they have a complicated relationship to privacy, embracing (like to many other people and institutions) privacy for themselves but somewhat less privacy for others, especially where they have institutional incentives to make money or protect government interests. 35/92 NSA Affirmative Privacy Advantage SLUDL/NAUDL 2015-16 Answers to “Corporations violate privacy ” (___) (__) Government surveillance is much more important than private surveillance – it has a greater reach and far more powerful consequences attached. Heymann, Professor of Law, Harvard Law School, 2015, (Philip B, “An Essay On Domestic Surveillance” Lawfare Research Paper Series Vol 3.2, http://www.lawfareblog.com/wp-content/uploads/2013/08/Lawfare-Philip-Heymann-SURVEILLANCE-forpubl-10-May-2015.pdf) Is Government Surveillance Particularly Important? Why should we care particularly about government surveillance in a world where private surveillance on the internet and the information and predictions that can be derived from a mass of such information are driving much of the economy of the internet as companies seek knowledge useful for developing and selling new products? Government surveillance has far greater reach. FBI and other law enforcement agents can – without any need of a predicate or judicial warrant – do whatever private individuals are allowed to do to discover information, using one of the “not-a-search” exceptions. But they can do much more. They can demand, with the assistance of a federal prosecutor, any records that “might” be useful to a grand jury – a standard much more far-reaching than probable cause or reasonable suspicion. The government can be, and is, empowered to demand access to any records kept by third parties, including the vast array of electronic records now kept by businesses about their customers. What private businesses can obtain by requiring a waiver of privacy rights as a condition of access to their goods or services, the government can also obtain without even that strained form of consent and without the alerting knowledge that consent gives to the individual being monitored. 36/92 NSA Affirmative Privacy Advantage SLUDL/NAUDL 2015-16 Answers to “Corporations violate privacy ” (__) Government surveillance is worse – there’s no opt-out and government force carries greater weight. Fung, covers technology for The Washington, 2013 (Brian, “Yes, there actually is a huge difference between government and corporate surveillance” – Washington Post - November 4, 2013 - http://www.washingtonpost.com/blogs/the-switch/wp/2013/11/04/yes-there-actuallyis-a-huge-difference-between-government-and-corporate-surveillance/) Yes, there actually is a huge difference between government and corporate surveillance When it comes to your online privacy — or what little is left of it — businesses and governments act in some pretty similar ways. They track your credit card purchases. They mine your e-mail for information about you. They may even monitor your movements in the real world. Corporate and government surveillance also diverge in important ways. Companies are looking to make money off of you, while the government aims to prevent attacks that would halt that commercial activity (along with some other things). But the biggest difference between the two has almost no relation to who's doing the surveillance and everything to do with your options in response. Last week, we asked you whether you'd changed your online behavior as a result of this year's extended national conversation about privacy — and if so, which form of snooping annoyed you more. Looking through the responses so far, this one caught my eye: The government because I can't *choose* not to be spied on by them. The government also has the power to kill or imprison me which no private company has. I am a firm believer that our founding fathers created a system that respected individual privacy and to see it eroded by the federal government concerns me deeply. I am a strong believer in the 1st, 2nd, 4th and 5th amendments. Putting aside the government's power to capture or kill, your inability to refuse the government is what distinguishes the NSA from even the nosiest companies on Earth. In a functioning marketplace, boycotting a company that you dislike — for whatever reason — is fairly easy. Diners who object to eating fake meat can stop frequenting Taco Bell. Internet users that don't like Google collecting their search terms can try duckduckgo, an anonymous search engine. By contrast, it's nearly impossible to simply pick up your belongings and quit the United States. For most people, that would carry some significant costs — quitting your job, for instance, or disrupting your children's education, or leaving friends and family. Those costs can be high enough to outweigh the benefits of recovering some hard-to-measure modicum of privacy. Besides, leaving the country would ironically expose you to even greater risk of surveillance, since you'd no longer be covered by the legal protections granted to people (even foreign terror suspects) that arrive to U.S. shores. There are still some ways to shield yourself from the NSA. To the best of our knowledge, the government has yet to crack the encryption protocols behind Tor, the online traffic anonymizing service. But Tor's users are also inherently the object of greater suspicion precisely because they're making efforts to cover their tracks. In the business world, no single company owns a monopoly over your privacy. The same can't really be said about the government. 37/92 NSA Affirmative Privacy Advantage SLUDL/NAUDL 2015-16 Answers to “Corporations violate privacy ” (___) (__) Government violations are worse. Even if they’re now - corporate privacy violations shouldn’t condone government violations. Sklansky, Professor of Law. UCLA, 2002 (David A. “BACK TO THE FUTURE: KYLLO, KATZ, AND COMMON LAW” - University of California, Los Angeles School of Law Research Paper Series. Mississippi Law Journal, Forthcoming Research Paper No. 02-17 - July 27. 2002 - www.isrcl.org/Papers/sklansky.pdf) There are two relatively straightforward ways out of this dilemma, but both would require the Supreme Court to rethink certain aspects of Fourth Amendment law.252 The first and simplest way out would be to recognize that government surveillance differs from private snooping, and therefore that the latter, no matter how common, should not eliminate protection against the former. This was the approach one lower court took when it found that government agents intruded on a reasonable expectation of privacy by using a telescope to peer into a suspect's apartment. The court expressly rejected the government's claim that any expectation of privacy was rendered unreasonable by the widespread use of telescopes by private citizens to spy on people living in high-rises. Private snooping, the court reasoned, had "no bearing" on the legality of government surveillance, because the government spies "for different purposes than private citizens." and sometimes "with more zeal." Accordingly, a person's "lack of concern about intrusions from private sources has little to do with an expectation of freedom from systematic governmental surveillance," and "[t]he fact that Peeping Toms abound does not license the government to follow suit."253 38/92 NSA Affirmative Privacy Advantage SLUDL/NAUDL 2015-16 Answers to Security Comes First (___) (__) Can’t trade privacy for security, rights are presumptively more important. Moore, Associate Professor Information School Program on Values in Society University of Washington, 2011 (Adam D. "Privacy, security, and government surveillance: WikiLeaks and the new accountability." Public Affairs Quarterly (2011): 141-156.) One could easily challenge Premise 2—there are numerous harms associated with allowing surveillance that are conveniently minimized or forgotten by the "nothing to hide" crowd. Daniel Solove notes that "privacy is threatened not by singular egregious acts but by a slow series of small, relatively minor acts, which gradually begin to add up."24 Solove also points out, as I have already highlighted, that giving governments too much power undermines the mission of providing for security—the government itself becomes the threat to security. The point was put nicely by John Locke: "This is to think, that Men are so foolish, that they take care to avoid what Mischiefs may be done them by Pole-Cats, or Foxes, but are content, nay think it Safety, to be devoured by Lions."25 It is also important to note the risk of mischief associated with criminals and terrorists compared to the kinds of mischief perpetrated by governments—even our government. In cases where there is a lack of accountability provisions and independent oversight, governments may pose the greater security risk. Moreover, there is sensitive personal information that we each justifiably withhold from others, not because it points toward criminal activity, but because others simply have no right to access this information. Consider someone's sexual or medical history. Imagine someone visiting a library to learn about alternative lifestyles not accepted by the majority. Hiding one's curiosity about, for example, a gay lifestyle may be important in certain contexts. This is true of all sorts of personal information like religious preferences or political party affiliations. Consider a slight variation of a "nothing to hide" argument related to what might be called physical privacy. Suppose there was a way to complete body cavity searches without harming the target or being more than a mere nuisance. Perhaps we search the targets after they have passed out drunk. Would anyone find it plausible to maintain a "nothing to hide" view in this case? I think not—and the reason might be that we are more confident in upholding these rights and policies that protect these rights than we are of almost any cost-benefit analysis related to security. Whether rights are viewed as strategic rules that guide us to the best consequences, as Mill would argue, or understood as deontic constraints on consequentialist sorts of reasoning, we are more confident in them than in almost any "social good" calculation. I am not saying that rights are absolute—they are just presumptively weighty. This line of argument is an attack on the first premise of the "nothing to hide" position. Rights are resistant to straightforward cost-benefit or consequentialist sort of arguments. Here we are rejecting the view that privacy interests are the sorts of things that can be traded for security. 39/92 NSA Affirmative Privacy Advantage SLUDL/NAUDL 2015-16 Answers to Security Comes First (___) (__) Security does not trump privacy. Moore, Associate Professor Information School Program on Values in Society University of Washington, 2011 (Adam D. "Privacy, security, and government surveillance: WikiLeaks and the new accountability." Public Affairs Quarterly (2011): 141-156.) The "Nothing to Hide" Argument According to what might be called the “security trumps” view, whenever privacy and security conflict, security wins—that is, security is more fundamental and valuable than privacy. First, without arguments, it is not clear why a “security trumps” view should be adopted over a “privacy trumps” view. Privacy or perhaps self-ownership seems at least as fundamental or intuitively weighty as security. Foreshadowing things to come, it is not at all clear—at least in some cases—that privacy does not enhance security and vice versa. Suppose that rights afforded their holders specific sorts of powers. For example, Fred’s privacy rights generate in him a god-like power to completely control access to his body and to information about him. If we had such powers, we would also have increased security. Furthermore, if we had complete security in our bodies and property, including informational security, we would have secured privacy as well. The tension between privacy and security arises because these values cannot be protected by individuals acting alone. Nevertheless, it is important to note that as these services are contracted out to other agents, like governments, we grant these parties power over us—power that may undermine security and privacy. Continuing with the “security trumps” argument, it would seem odd to maintain that any increase in security should be preferred to any increase in privacy or any decrease in privacy is to be preferred to any decrease in security. Such a view would sanction massive violations of privacy for mere incremental and perhaps momentary gains in security. Also, given that others will provide security and power is likely a necessary part of providing security, we have strong prudential reasons to reject the “security trumps” view. If those who provide security were saints, then perhaps there would be little to worry about. The cases already presented are sufficient to show that we are not dealing with saints. 40/92 NSA Affirmative Privacy Advantage SLUDL/NAUDL 2015-16 Answers to “Posner – Balancing Good” (___) (__) The Constitution enshrines fundamental principles as side constraints that guide cost-benefit policy analysis. It’s not just a question of balancing — Posner is wrong. Cole, Professor at Georgetown University Law Center, 2007 (David, 2007 (“‘How to Skip the Constitution’: An Exchange,” New York Review of Books, January 11th, Available Online at http://www.nybooks.com/articles/archives/2007/jan/11/how-to-skip-the-constitution-anexchange/, Accessed 06-28-2015) More generally, Judge Posner shies away from his own constitutional theory when he says that to declare a practice constitutional is not the same as saying that it is desirable as a policy matter. That is certainly true as a theoretical matter, at least where one’s constitutional theory is not reducible to one’s policy preferences. But as my review points out, Posner views questions of constitutionality as simply a matter of weighing all the costs and benefits, which is surely the same utilitarian calculus the policymaker would use to determine whether a practice is desirable. Under Posner’s approach, then, it’s hard to see why there would be any room between what is desirable and what is constitutional. Judge Posner accuses me, in effect, of subscribing to the same constitutionalism-as-policy approach that he uses by asserting, without evidentiary support, that my constitutional views simply track my own policy preferences; “the rest is rhetoric.” But I believe that there is a critical distinction between constitutionalism and mere policy preferences. In fact, our Constitution gives judges the authority to declare acts of democratically elected officials unconstitutional on the understanding that they do not simply engage in the same costbenefit analyses that politicians and economists undertake. My own view is that the very sources Judge Posner dismisses—text, precedent, tradition, and reason—are absolutely essential to principled constitutional decision-making. Posner suggests that because none of these elements necessarily provides a determinate answer to difficult questions, we may as well abandon them for his seat-of-the-pants, cost-benefit approach. It is true that text, precedent, tradition, and reason do not determine results in some mechanistic way. That is why we ask judges, not machines, to decide constitutional cases. But these sources are nonetheless critically important constraints on and guides to constitutional decision-making. They are what identify those principles that have been deemed fundamental—and therefore constitutional—over our collective history. That there are differences over principle in no way excludes the need for reasoned argument about them. 41/92 NSA Affirmative Privacy Advantage SLUDL/NAUDL 2015-16 Answers to Mass Surveillance Solves Discrimination (__) (__) No, Mass Surveillance is discriminatory – privacy is critical to stop this. Richards, Professor of Law, Washington University. 2015, Neil M., “Four Privacy Myths” Revised form, "A World Without Privacy?" (Cambridge Press, Austin Sarat, ed. 2015), Forthcoming. Available at SSRN: http://ssrn.com/abstract=2427808 On the one hand, the increased efficiency of sorting enabled by the information revolution has many useful applications. Largedataset analytics has many powerful applications that don’t even use personal data, such as weather and traffic forecasting, the design of better automotive components, spell-checkers, and search engines.77 Analytics based on personal data are useful, too, enabling better decisions in the medical, credit and insurance contexts, as well as the prevention of terrorism and other crimes.78 But this increased power to sort can be used for bad or morally ambiguous purposes as well. Lawyers have another word for this kind of sorting, which is “discrimination.” Consider the use of consumer profiles to determine the likelihood we would buy products at a given price. Such relatively simple analytic techniques could enable a website (say, like Amazon.com) in which all prices were optimized to the highest value we might be willing to pay. Sophisticated analytics could also raise the spectre of a new kind of “redlining” – the denial or discrimination of services to people on the basis of race or other suspect criteria. Of course, predictive analytics need not use race directly; they could be designed to ignore race and use other variables that correlate with race. Or perhaps such algorithms might not use race indirectly, but impose a brutal individualized economic rationalism upon us all as consumers and citizens. Thankfully, the strong form of that society is not upon us yet, but some of its weaker cousins are. And if we dismiss the problems caused by privacy or personal data as nothing more than bad people hiding bad deeds, we will miss the transformative power effects of the digital revolution entirely. For better or worse, we use the term “privacy” as a shorthand to capture all of the issues raised by personal data. As a result, privacy is not just for those of us with something to hide. Of course, we all have something to hide. But more fundamentally, questions of privacy include many of the most fundamental questions of civil liberties, economic, and political power in a digital society. From that perspective, privacy is for everyone. 42/92 NSA Affirmative Privacy Advantage SLUDL/NAUDL 2015-16 Answers to Mass Surveillance Solves Discrimination (__) (__) Surveillance exacerbates existing inequality. Magi, Librarian, University of Vermont- Burlington, 2011 (Trina J. "Fourteen Reasons Privacy Matters: A Multidisciplinary Review of Scholarly Literature1." The Library 81.2 (2011) Privacy helps prevent sorting of people into categories that can lead to lost opportunities and deeper inequalities.—Many scholars are concerned that the gathering of data about individuals and the sorting of people into categories can lead to lost opportunities, deeper inequalities, destabilized political action, and victimization by error, oversimplification, and decontextualization. Using the panopticon metaphor, Gandy discusses what he calls the “panoptic sort,” a “discriminatory process that sorts individuals on the basis of their estimated value or worth” and “reaches into every aspect of individuals’ lives in their roles as citizens, employees, and consumers” [33, p. 1]. Gandy claims the panoptic sort is a defensive technology more concerned with avoiding risk and loss than with realizing a gain [33, p. 17]. Such sorting has been facilitated by computer technology that has made it cost-effective to collect, store, and analyze data, and match it with other data sets. Gandy is troubled by the fact that those in power use this information to predict future behavior of an individual not on the basis of the behavior of that particular individual but rather on the more general basis of the past behavior of other individuals in the group or class to which the person has been assigned based on some attributes [33, p. 144]. Based on this sorting, individuals will be presented with limited options from which to choose, leading to an increased knowledge gap between the haves and the have-nots and a generalized lowering of the average level of public understanding [33, p. 2]. Reiman agrees that the panopticon is a more fitting metaphor than the fishbowl for this new threat to privacy, because the modern means of collecting information gathers various publicly observable activities that are dispersed over space and time and makes them visible from a single point [27, p. 196]. Many writers express concern about the way administrative systems for collecting data about people must necessarily oversimplify the nature of individuals and communities. James Scott says “a human community is surely far too complicated and variable to easily yield its secrets to bureaucratic formulae” [35, p. 23], yet when governments collect standardized records and documents, the information in these records easily becomes the only information to be considered by the state. “An error in such a document can have far more power—and for far longer—than can an unreported truth,” he says [35, p. 83]. 43/92 NSA Affirmative Privacy Advantage SLUDL/NAUDL 2015-16 Privacy is a Gateway Right (__) Privacy is a gateway right. Surveillance threatens it. PoKempne, General Counsel at Human Rights Watch, 2014, (Dinah, , “The Right Whose Time Has Come (Again): Privacy in the Age of Surveillance” 1/21/14 http://www.hrw.org/world-report/2014/essays/privacy-in-age-of-surveillance) Technology has invaded the sacred precincts of private life, and unwarranted exposure has imperiled our security, dignity, and most basic values. The law must rise to the occasion and protect our rights. Does this sound familiar? So argued Samuel Warren and Louis Brandeis in their 1890 Harvard Law Review article announcing “The Right to Privacy.” We are again at such a juncture. The technological developments they saw as menacing—photography and the rise of the mass circulation press—appear rather quaint to us now. But the harms to emotional, psychological, and even physical security from unwanted exposure seem just as vivid in our digital age. Our renewed sense of vulnerability comes as almost all aspects of daily social life migrate online. At the same time, corporations and governments have acquired frightening abilities to amass and search these endless digital records, giving them the power to “know” us in extraordinary detail. In a world where we share our lives on social media and trade immense amounts of personal information for the ease and convenience of online living, some have questioned whether privacy is a relevant concept. It is not just relevant, but crucial. Indeed, privacy is a gateway right that affects our ability to exercise almost every other right, not least our freedom to speak and associate with those we choose, make political choices, practice our religious beliefs, seek medical help, access education, figure out whom we love, and create our family life. It is nothing less than the shelter in which we work out what we think and who we are; a fulcrum of our autonomy as individuals. The importance of privacy, a right we often take for granted, was thrown into sharp relief in 2013 by the steady stream of revelations from United States government files released by former National Security Agency (NSA) contractor Edward Snowden, and published in the Guardian and other major newspapers around the world. These revelations, supported by highly classified documents, showed the US, the UK, and other governments engaged in global indiscriminate data interception, largely unchecked by any meaningful legal constraint or oversight, without regard for the rights of millions of people who were not suspected of wrongdoing. The promise of the digital age is the effortless, borderless ability to share information. That is its threat as well. As the world’s information moves into cyberspace, surveillance capabilities have grown commensurately. The US now leads in ability for global data capture, but other nations and actors are likely to catch up, and some already insist that more data be kept within their reach. In the end, there will be no safe haven if privacy is seen as a strictly domestic issue, subject to many carve-outs and lax or non-existent oversight. 44/92 NSA Affirmative Privacy Advantage SLUDL/NAUDL 2015-16 Privacy is key to Autonomy (___) (__) Privacy links rational agency and moral autonomy. Magi, Librarian, University of Vermont- Burlington, 2011 (Trina J. "Fourteen Reasons Privacy Matters: A Multidisciplinary Review of Scholarly Literature1." The Library 81.2 (2011). Gavison admits that there have always been some autonomous individuals in totalitarian societies, and therefore privacy may not be necessary for autonomy. But she says the fact that most people require privacy is enough to justify it as a value, because “we are not all giants, and societies should enable all, not only the exceptional, to seek moral autonomy” [16, p. 450]. Charles Fried describes a “most basic” form of complete privacy in which privacy serves not to protect things we will share only with friends but to protect certain thoughts from the whole world. Although the sharing of certain thoughts with a lover or friend, he says, would be a “hostile act,” the thinking of those thoughts is completely consistent with friendship and love because “these thoughts, prior to being given expression, are mere unratified possibilities for action” [29, p. 485]. Only when we express thoughts do we adopt them and choose to make them part of ourselves, he says, and this is why privacy is essential to the freedom to define ourselves. Julie Inness also talks about privacy providing a sphere of autonomy in which a person can develop a self-concept as an originator of love, liking, and care [30, p. 107]. In their theory of privacy as a fundamental moral right, Alfino and Mayes contend that a person requires personal space in order to reason about his/her choices, that reasoning activity is what links rational agency and moral autonomy, and that to deprive a person of her ability to reason is to fundamentally interfere with a person’s capacity for self-government. According to this framework, privacy is “the condition of having secured one’s personal space, by which we mean the right to exercise our practical reason without undue interference from others” [18] 45/92 NSA Affirmative Privacy Advantage SLUDL/NAUDL 2015-16 Surveillance Hurts Freedom (___) (__) Surveillance threatens human freedom and dignity. Cohen, Ph.D., ethicist and political analyst, 2014 (Elliot D.. Technology of Oppression: Preserving Freedom and Dignity in an Age of Mass, Warrantless Surveillance.. DOI: 10.1057/9781137408211.0011. ) The threat posed by mass, warrantless surveillance technologies Presently, such a threat to human freedom and dignity lies in the technological erosion of human privacy through the ever-evolving development and deployment of a global, government system of mass, warrantless surveillance. Taken to its logical conclusion, this is a systematic means of spying on, and ultimately manipulating and controlling, virtually every aspect of everybody's private life—a thoroughgoing, global dissolution of personal space, which is supposed to be legally protected. In such a governmental state of "total (or virtually total) information awareness," the potential for government control and manipulation of the people's deepest and most personal beliefs, feelings, and values can transform into an Orwellian reality—and nightmare. As will be discussed in Chapter 6, the technology that has the potential to remove such scenarios from the realm of science fiction to that of true science is currently being developed. This is not to deny the legitimate government interest in "national security"; however, the exceptional disruption of privacy for legitimate state reasons cannot and should not be mistaken for a usual and customary rule of mass invasion of people's private lives without their informed consent. Benjamin Franklin wisely and succinctly expressed the point: "Those who surrender freedom for security will not have, nor do they deserve, either one." In relinquishing our privacy to government, we also lose the freedom to control, and act on, our personal information, which is what defines us individually, and collectively, as free agents and a free nation. In a world devoid of freedom to control who we are, proclaiming that we are "secure" is an empty platitude. 46/92 NSA Affirmative Privacy Advantage SLUDL/NAUDL 2015-16 Surveillance Hurts Freedom (__) Government Surveillance risks total invasion of liberty. Schneier, fellow at the Berkman Center for Internet and Society at Harvard Law School 15 (Bruce, Inc 3/2/15, Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. P. 106) The biggest cost is liberty, and the risk is real enough that people across political ideologies are objecting to the sheer invasiveness and pervasiveness of the surveillance system. Even the politically conservative and probusiness Economist magazine argued, in a 2013 editorial about video surveillance, that it had gone too far: "This is where one of this newspaper's strongly held beliefs that technological progress should generally be welcomed, not feared, runs up against an even deeper impulse, in favour of liberty. Freedom has to include some right to privacy: if every move you make is being chronicled, liberty is curtailed.' ACCUSATION BY DATA In the 17th century, the French statesman Cardinal Richelieu famously said, "Show me six lines written by the most honest man in the world, and I will find enough therein to hang him. Lavrentiy Beria, head of Joseph Stalin's secret police in the old Soviet Union, declared, "Show me the man, and I'll show you the crime." Both were saying the same thing: if you have enough data about someone, you can find sufficient evidence to find him guilty of something. It's the reason many countries' courts prohibit the police from engaging in "fishing expeditions." It's the reason the US Constitution specifically prohibits general warrants documents that basically allow the police to search for anything. General warrants can be extremely abusive; they were used by the British in colonial America as a form of social control. Ubiquitous surveillance means that anyone could be convicted of lawbreaking, once the police set their minds to it. It is incredibly dangerous to live in a world where everything you do can be stored and brought forward as evidence against you at some later date. There is significant danger in allowing the police to dig into these large data sets and find "evidence" of wrongdoing, especially in a country like the US with so many vague and punitive laws, which give prosecutors discretion over whom to charge with what, and with overly broad material witness laws. This is especially true given the expansion of the legally loaded terms "terrorism," to include conventional criminals, and "weapons of mass destruction," to include almost anything, including a sawed-off shotgun. The US terminology is so broad that someone who donates $10 to Hamas's humanitarian arm could be considered a terrorist. Surveillance puts us at risk of abuses by those in power, even if we're doing nothing wrong at the time of surveillance. The definition of "wrong" is often arbitrary, and can quickly change. For example, in the US in the 1930s, being a Communist or Socialist was a bit of an intellectual fad, and not considered wrong among the educated classes. In the 1950s, that changed dramatically with the witch-hunts of Senator Joseph McCarthy, when many intelligent, principled American citizens found their careers destroyed once their political history was publicly disclosed. Is someone's reading of Occupy, Tea Party, animal rights, or gun rights websites going to become evidence of subversion in five to ten years? 47/92 NSA Affirmative Privacy Advantage SLUDL/NAUDL 2015-16 Surveillance causes a Chilling Effect (___) (__) Surveillance creates conformity, that chills dissent. Desai, Associate Professor of Law and Ethics, Georgia Institute of Technology, 2014 Deven "Constitutional Limits on Surveillance: Associational Freedom in the Age of Data Hoarding." Notre Dame L. Rev. 90 (2014): 579. As scholars of association might say, with surveillance the room to disagree about what the common good is diminishes. n261 [*623] One way to think of the problem is as the need for anonymity. Christopher Slobogin has explained that perspective: "Anonymity in public promotes freedom of action and an open society. Lack of public anonymity promotes conformity and an oppressive society." n262 He calls this problem "public privacy." n263 That seeming oxymoron captures the need to be public, yet private from government oversight. It is anonymity to the government that matters. That anonymity may be based on protections from direct surveillance or protections from the government accessing third party, private sector records of recent and past communications and acts. Julie Cohen has shown why that is so. n264 Surveillance changes behaviors, because "the experience of being watched will constrain, ex ante, the acceptable spectrum of belief and behavior." n265 Instead of robust, diverse, and challenging ideas, we will favor the "the bland and the mainstream." n266 We end up with a diminished "capacity to act and to decide," which leads to "the highest possible degree of compliance with [what the state determines is] the model ... citizen." n267 This problem is a type of chilling effect. n268 48/92 NSA Affirmative Privacy Advantage SLUDL/NAUDL 2015-16 Surveillance causes a Chilling Effect (___) (__) Surveillance destroys democracy because it chills free expression and dissent. Schneier, fellow at the Berkman Center for Internet and Society at Harvard Law School 15 (Bruce, Inc 3/2/15, Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. P. 190) Surveillance has a potentially enormous chilling effect on society. US Supreme Court Justice Sonia Sotomayor recognized this in her concurring opinion in a 2012 case about the FBI's installing a GPS tracker in someone's car. Her comments were much broader: "Awareness that the Government may be watching chills associational and expressive freedoms. And the Government's unrestrained power to assemble data that reveal private aspects of identity is susceptible to abuse. The net result is that GPS monitoring—by making available at a relatively low cost such a substantial quantity of intimate information about any person whom the Government, in its unfettered discretion, chooses to track—may 'alter the relationship between citizen and government in a way that is inimical to democratic society. “ Columbia University law professor Eben Moglen wrote that "omnipresent invasive listening creates fear. And that fear is the enemy of reasoned, ordered liberty." Surveillance is a tactic of intimidation. In the US, we already see the beginnings of this chilling effect. According to a Human Rights Watch report, journalists covering stories on the intelligence community, national security, and law enforcement have been significantly hampered by government surveillance. Sources are less likely to contact them, and they themselves are worried about being prosecuted. Human Rights Watch concludes that stories in the national interest that need to be reported don't get reported, and that the public is less informed as a result. That's the chilling effect right there. Lawyers working on cases where there is some intelligence interest—foreign government clients, drugs, terrorism—are also affected. Like journalists, they worry that their conversations are monitored and that discussions with their clients will find their way into the prosecution's hands. Post-9/11 surveillance has caused writers to self-censor. They avoid writing about and researching certain subjects; they’re careful about communicating with sources, colleagues, or friends abroad. A Pew Research Center study conducted just after the first Snowden articles were published found that people didn't want to talk about the NSA online. A broader Harris poll found that nearly half of Americans have changed what they research, talk about, and write about because of NSA surveillance. Surveillance has chilled Internet use by Muslim Americans, and by groups like environmentalists, gun-rights activists, drug policy advocates, and human rights workers. After the Snowden revelations of 2013, people across the world were less likely to search personally sensitive terms on Google. A 2014 report from the UN High Commissioner on Human Rights noted, "Even the mere possibility of communications information being captured creates an interference with privacy, with a potential chilling effect on rights, including those to free expression and association. 49/92 NSA Affirmative Privacy Advantage SLUDL/NAUDL 2015-16 Fear Magnifies Privacy Loss (___) (__) Fear and perception magnify privacy loss. Heymann, Professor of Law, Harvard Law School, 2015, (Philip B, “An Essay On Domestic Surveillance” Lawfare Research Paper Series Vol 3.2, http://www.lawfareblog.com/wp-content/uploads/2013/08/Lawfare-Philip-Heymann-SURVEILLANCE-forpubl-10-May-2015.pdf) The presence of fear, even unreasonable fear, has important effects on the confident and free social and political life on which democracy depends. Fear of discovery alone could easily affect with whom I associate, for example, or what use I make of psychiatrists or drugs. The fear is far deeper and more lasting if a warrant from a judge is not required. Internal agency processes are not an adequate substitute. The deep suspicions that are valuable in an agency charged with preventing terrorism or preventing crime have a dark side; they will infect its judgment of when there is a genuine need to see the required information. Important consequences turn on the citizens’ trust that data the government has acquired will not be used without there being a “real” need for its use. Much of the population would not trust any such assurance by the NSA or the FBI alone. Perceptions of government prying do matter. Whether a dramatic growth in the capacity for, and fruits of, government surveillance would be experienced as harmful to individual freedom, civil society and democratic institutions depend on more than how the information would, in fact, be used. Fear also depends on what other potential uses citizens would suspect; the exercise of individual liberty and autonomy additionally depend on what citizens suspect might happen with that information and the precautionary steps – curtailment of entirely lawful activities, for example – citizens might take. Attitudes toward government and one’s freedoms also depend upon a number of broader contextual factors: the extent of the perceived danger sought to be prevented; the current level of suspicion or trust in the government; the history and culture of privacy in the society; and much else. Some few would argue that the loss of privacy might not be a concern at all. After all, most people do not harbor a crime or a scandal that they must hide behind claims to privacy; their lives are too proper for that. But those voices are a small minority; for most people, the value of privacy is to protect the possibility of association and, particularly, intimacy with others, irrespective of whether one has anything to hide in the way of crime or scandal. One fact is clear. The fear and the prospect of rapidly expanding government surveillance in the United States are plainly there on the near horizon. The children of the Snowden age take it for granted that they are being monitored and they fear the social effects of that monitoring. 50/92 NSA Affirmative Privacy Advantage SLUDL/NAUDL 2015-16 Answer to “Nothing to Hide” (__) (__) Privacy is not about hiding bad deeds, but is essential for individuality and selfdetermination, Richards, Professor of Law, Washington University. 2015, Neil M., “Four Privacy Myths” Revised form, "A World Without Privacy?" (Cambridge Press, Austin Sarat, ed. 2015), Forthcoming. Available at SSRN: http://ssrn.com/abstract=2427808 A second reason why the “Nothing to Hide” argument is misleading is that it reduces privacy to an individual’s right to hide big secrets. Such a crude reduction of the issue ignores both the complexity of privacy, as well as the social value that comes from living in a society that not everything about us is publicly available all of the time. This is the insight of legal scholar Daniel Solove in his book “Nothing to Hide.” Solove shows how thinking of privacy as the hiding of discreditable secrets by individuals is a mistake because privacy is about more than hiding secrets, and can mean a wide variety of things. Moreover, he notes that “privacy is “often eroded over time, little bits dissolving almost imperceptibly until we finally begin to notice how much is gone.”64 Privacy, in this view, is a social value rather than merely an individual one. Rather than thinking about privacy as merely the individual right to hide bad deeds, we should think more broadly about the kind of society we want to live in. A society in which everyone knew everything about everyone else would be oppressive because it would place us all under the glare of publicity all the time; there would be no “free zones for individuals to flourish.”65 Legal scholar Julie Cohen goes further, arguing that privacy is necessary for humans to be able to decide who they are. In Cohen’s account, our selves are fluid, constantly being built and changed by our activities, thoughts, and interactions with other people. Privacy, in her view, shelters the development of our dynamic selves “from the efforts of commercial and government actors to render individuals and communities fixed, transparent, and predictable.” Privacy protects our ability to manage boundaries between ourselves and others so that self-determination is possible.66 It helps us avoid the calculating, quantifying tyranny of the majority. Privacy is thus essential for individuality and selfdetermination, with substantial benefits for society. 51/92 NSA Affirmative Economy Advantage SLUDL/NAUDL 2015-16 Economy Advantage – Internal Link Magnifier Additionally, NSA surveillance has created a global move towards “data nationalisation” which threatens to fragment the internet. Omtzigt, Dutch politician, 2015, (Pieter Herman “Explanatory memorandum by Mr Pieter Omtzigt, rapporteur” Committee on Legal Affairs and Human Rights, Mass surveillance Report, 1/26/2015, http://websitepace.net/documents/19838/1085720/20150126-MassSurveillance-EN.pdf) 108. In response to growing discontent with US surveillance, one political response has been to push for more “technological sovereignty” and “data nationalisation”. The Snowden disclosures have therefore had serious implications on the development of the Internet and hastened trends to “balkanize” the Internet to the detriment of the development of a wide, vast and easily accessible online network. The Internet as we knew it, or believed we knew it, is a global platform for exchange of information, open and free debate, and commerce. But Brazil and the European Union, for example, announced plans to lay a $185 million undersea fibre-optic cable between them to thwart US surveillance. German politicians also called for the development of a “German internet” for German customers’ data to circumvent foreign servers and the information to stay on networks that would fully be under Germany’s control. 159 Russia passed a law obliging internet companies to store the data of Russian users on servers in Russia.160 After a six-month inquiry following the Snowden disclosures, the European Parliament adopted a report on the NSA surveillance programme in February 2014 161, which argues that the EU should suspend bank data and ‘Safe Harbour’ agreements on data privacy (voluntary data protection standards for non-EU companies transferring EU citizens’ personal data to the US) with the United States. MEPs added that the European Parliament should only give its consent to the EU-US free trade deal (TTIP) that is being negotiated, if the US fully respects EU citizens’ fundamental rights. The European Parliament seeks tough new data protection rules that would place US companies in the difficult situation of having to check with EU authorities before complying with mandatory requests made by US authorities. The European Parliament’s LIBE Committee also advocated the creation of a “European data cloud” that would require all data from European consumers to be stored or processed within Europe, or even within the individual country of the consumer concerned. Some nations, such as Australia, France, South Korea, and India, have already implemented a patchwork of data-localisation requirements according to two legal scholars.162 52/92 NSA Affirmative Economy Advantage SLUDL/NAUDL 2015-16 Economy Advantage – Internal Link Expander This regional fragmentation of the internet would collapse the global economy and create the necessary conditions for global instability. Jardine, Center for International Governance Innovation Research Fellow, 2014 (Eric, 9-19-2014, "Should the Average Internet User in a Liberal Democracy Care About Internet Fragmentation? ," Cigi, https://www.cigionline.org/blogs/reimagining-internet/should-average-internet-userliberal-democracy-care-about-internet-fragme) Even though your average liberal democratic Internet user wouldn’t see it, at least at the content level, the fragmentation of the Internet would matter a great deal. If the Internet was to break apart into regional or even national blocks, there would be large economic costs in terms of lost future potential for global GDP growth . As a recent McKinsey & Company report illustrates, upwards of 15 to 25 percent of Global GDP is currently determined by the movement of goods, money, people and data. These global flows (which admittedly include more than just data flows) contribute yearly between 250 to 400 billion dollars to global GDP growth. The contribution of global flows to global GDP growth is only likely to grow in the future, provided that the Internet remains a functionally universal system that works extraordinarily well as a platform for e-commerce. Missing out on lost GDP growth harms people economically in liberal democratic countries and elsewhere. Average users in the liberal democracies should care, therefore, about the fragmentation of the broader Internet because it will cost them dollars and cents, even if the fragmentation of the Internet would not really affect the content that they themselves access. Additionally, the same Mckinsey & Company report notes that countries that are well connected to the global system have GDP growth that is up to 40 percent higher than those countries that have fewer connections to the wider world. Like interest rates, annual GDP growth compounds itself, meaning that early gains grow exponentially. If the non-Western portions of the Internet wall themselves off from the rest (or even if parts of what we could call the liberal democratic Internet do the same), the result over the long term will be slower growth and a smaller GDP per capita in less well-connected nations. Some people might look at this situation and be convinced that excluding people in non-liberal democracies from the economic potential of the Internet is not right. In normative terms, these people might deserve to be connected, at the very least so that they can benefit from the same economic boon as those in more well connected advanced liberal democracies. In other words, average Internet users in liberal democracies should care about Internet fragmentation because it is essentially an issue of equality of opportunity. Other people might only be convinced by the idea that poverty, inequality, and relative deprivation, while by no means sufficient causes of terrorism, insurgency, aggression and unrest, are likely to contribute to the potential for an increasingly conflictual world. Most average Internet users in Liberal democracies would likely agree that preventing flashes of unrest (like the current ISIL conflict in Iraq and Syria) is better than having to expend blood and treasure to try and fix them after they have broken out. Preventive measures can include ensuring solid GDP growth through global interconnection in every country, even if this is not, as I mentioned before, going to be enough to fix every problem every time. 53/92 NSA Affirmative Economy Advantage SLUDL/NAUDL 2015-16 Answers to Hurts Foreign Companies More (___) (__) NSA spying has cost American companies billions of dollars. Donohue, Professor at Georgetown Law Center 2015 Laura, , “High Technology, Consumer Privacy, and U.S. National Security.” (2015). Business Law Review, Forthcoming. Available at SSRN: http://ssrn.com/abstract=2563573 The NSA programs, and public awareness of them, have had an immediate and detrimental impact on the U.S. economy. They have cost U.S. companies billions of dollars in lost sales, even as companies have seen their market shares decline. American multinational corporations have had to develop new products and programs to offset the revelations and to build consumer confidence. At the same time, foreign entities have seen revenues increase. Beyond the immediate impact, the revelation of the programs, and the extent to which the NSA has penetrated foreign data flows, has undermined U.S. trade agreement negotiations. It has spurred data localization efforts around the world, and it has raised the spectre of the future role of the United States in Internet governance. Even if opportunistic, these shifts signal an immediate and longterm impact of the NSA programs, and public knowledge about them, on the U.S. economy. 54/92 NSA Affirmative Economy Advantage SLUDL/NAUDL 2015-16 Answers to Companies won’t leave cloud (___) (__) NSA domestic surveillance gave new life global data localization movements which threaten to undermine the internet economy Kehl et al, Policy Analyst at New America’s Open Technology Institute, 2014 (Danielle, New America’s Open Technology Institute Policy Paper, Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity, July 2014) Internet jurisdiction and borders were contentious issues long before the Snowden leaks, but the debate has become significantly more complex in the past year. For decades, the border- less nature of cyberspace103 has raised concerns about sovereignty and how governments can regulate and access their citizens’ personal infor- mation or speech when it is stored on servers that may be located all over the world.104 Various data localization and national routing proposals have been put forth by governments that seek great- er control of the information that flows within their borders, often in order to make censorship and surveillance over the local population eas- ier.105 On the other side, free speech advocates, technologists, and civil society organizations generally advocate for a borderless cyberspace governed by its own set of internationally-agreed upon rules that promote the protection of human rights, individual privacy, and free expression.106 The revelations about NSA surveillance have heightened concerns on both sides of this debate. But the disclosures appear to have given new ammunition to proponents of greater governmental control over traffic and network infrastructure, accelerating the number and scope of national control proposals from both longtime advocates as well as governments with relatively solid track records on human rights. There are now more than a dozen countries that have introduced or are actively discussing data localization laws.108 Broadly speaking, data localization can be defined as any measures that “specifically encumber the transfer of data across national borders,” through rules that prevent or limit these information flows.109 The data localiza- tion proposals being considered post-Snowden generally require that foreign ICT companies maintain infrastructure located within a coun- try and store some or all of their data on that country’s users on local servers.110 Brazil, for example, has proposed that Internet companies like Facebook and Google must set up local data centers so that they are bound by Brazilian privacy laws.111 The Indian government’s draft policy would force companies to maintain part of their IT infrastructure in-country, give local authorities access to the encrypted data on their servers for criminal investigations, and prevent local data from being moved out of country.112 Germany, Greece, Brunei, and Vietnam have also put forth their own data sovereignty proposals. Proponents argue that these policies would provide greater security and privacy protection because local servers and infrastructure can give governments both physical control and legal jurisdiction over the data being stored on them—although the policies may come with added political and economic benefits for those countries as well. “Home grown and guaranteed security in data storage, hardware manufacture, cloud computing services and routing are all part of a new discussion about ‘technological sovereignty,’” write Mascolo and Scott. “It is both a political response and a marketing op- portunity.” 113 At the same time, data localization can also facilitate local censorship and surveil- lance, making it easier for governments to exert control over the Internet infrastructure. 55/92 NSA Affirmative Economy Advantage SLUDL/NAUDL 2015-16 Answers to Tech industry not hurt (___) (__) The latest evidence indicates that the tech industry is losing billions. And it has spilled over to other areas of the economy. Castro and Mcquinn, Director of the Center for Data Innovation and Research Assistant, 2015 (Daniel & Alan, 6/9/15, “Beyond the USA Freedom Act: How U.S. Surveillance Still Subverts U.S. Competitiveness” “Information Technology & Innovation Foundation” http://www.itif.org/publications/2015/06/09/beyond-usa-freedom-act-how-us-surveillance-still-subverts-uscompetitiveness Almost two years ago, ITIF described how revelations about pervasive digital surveillance by the U.S. intelligence community could severely harm the competitiveness of the United States if foreign customers turned away from U.S.-made technology and services.1 Since then, U.S. policymakers have failed to take sufficient action to address these surveillance concerns; in some cases, they have even fanned the flames of discontent by championing weak information security practices.2 In addition, other countries have used anger over U.S. government surveillance as a cover for implementing a new wave of protectionist policies specifically targeting information technology. The combined result is a set of policies both at home and abroad that sacrifices robust competitiveness of the U.S. tech sector for vague and unconvincing promises of improved national security. ITIF estimated in 2013 that even a modest drop in the expected foreign market share for cloud computing stemming from concerns about U.S. surveillance could cost the United States between $21.5 billion and $35 billion by 2016.3 Since then, it has become clear that the U.S. tech industry as a whole, not just the cloud computing sector, has under-performed as a result of the Snowden revelations. Therefore, the economic impact of U.S. surveillance practices will likely far exceed ITIF’s initial $35 billion estimate. This report catalogues a wide range of specific examples of the economic harm that has been done to U.S. businesses. In short, foreign customers are shunning U.S. companies. The policy implication of this is clear: Now that Congress has reformed how the National Security Agency (NSA) collects bulk domestic phone records and allowed private firms—rather than the government—to collect and store approved data, it is time to address other controversial digital surveillance activities by the U.S. intelligence community. The U.S. government’s failure to reform many of the NSA’s surveillance programs has damaged the competitiveness of the U.S. tech sector and cost it a portion of the global market share.5 This includes programs such as PRISM—the controversial program authorized by the FISA Amendments Act, which allows for warrantless access to private-user data on popular online services both in the United States and abroad—and Bullrun—the NSA’s program to undermine encryption standards both at home and abroad. Foreign companies have seized on these controversial policies to convince their customers that keeping data at home is safer than sending it abroad, and foreign governments have pointed to U.S. surveillance as justification for protectionist policies that require data to be kept within their national borders. In the most extreme cases, such as in China, foreign governments are using fear of digital surveillance to force companies to surrender valuable intellectual property, such as source code.6 56/92 NSA Affirmative Economy Advantage SLUDL/NAUDL 2015-16 Answers to Economic Decline Doesn’t Cause War (___) (__) Statistics prove decline does cause war Blomberg & Hess,Professor of Economics at Wellesley & Oberlin respectively, 2002 (Brock & Gregory, February 2002, “The Temporal Links between Conflict and Economic Activity,” Journal of Conflict Resolution To begin this temporal “causal” investigation, we first need to develop a statistical framework to estimate the joint, dynamic determination of the occurrence of internal conflict, external conflict, and growth. Because conflict is measured as a discrete variable, researchers typically estimate the occurrence as a probability, or if we consider both internal and external conflict, we can always estimate the joint probability distribution. But are there similar interpretations of economic activity as a discrete state? Indeed, a broad literature considers the evolution of states in the economy as the natural progression of phases. In fact, one of the key historical studies of U.S. and international business cycles, undertaken by Burns and Mitchell (1944), treated the state of the economy as either an expansion or contraction, on which the National Bureau of Economic Research’s dating procedure for recessions was founded. 4 The relevance for our study is that breakpoints in the state of the economy, either expansion or recession, are analogous to break points in peace—internal or external conflicts.5 Using an unbalanced panel of data covering 152 countries from 1950 to 1992, we therefore consider the joint determination of internal conflict, external conflict, and the state of the economy as measured by the aforementioned discrete variables. We find that the relationship between the variables is not a simple one. Conflict does appear to be highly related to the economy for the entire sample. However, it seems to be most highly related when considering certain nation-groups. For nondemocracies or in regions highly populated by nondemocracies, there seems to be an intimate link between a poor economy and the decision to go to war—both internally and externally. These results confirm much of the original hypotheses put forth in Blomberg, Hess, and Thacker (2001)—namely, that there is compelling evidence of a conditional poverty-conflict trap. 57/92 NSA Affirmative Economy Advantage SLUDL/NAUDL 2015-16 Answers to Cybersecurity Sector Turn (__) (__) The mass surveillance model hurts cybersecurity and global Internet freedom. Kehl et al, Policy Analyst at New America’s Open Technology Institute, 2014 (Danielle, New America’s Open Technology Institute Policy Paper, Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity, July 2014) Costs to Cybersecurity: The NSA has done serious damage to Internet security through its weakening of key encryption standards, insertion of surveillance backdoors into widely-used hardware and software products, stockpiling rather than responsibly disclosing information about software security vulnerabilities, and a variety of offensive hacking operations undermining the overall security of the global Internet. The U.S. government has already taken some limited steps to mitigate this damage and begin the slow, difficult process of rebuilding trust in the United States as a responsible steward of the Internet. But the reform efforts to date have been relatively narrow, focusing primarily on the surveillance programs’ impact on the rights of U.S. citizens. Based on our findings, we recommend that the U.S. government take the following steps to address the broader concern that the NSA’s programs are impacting our economy, our foreign relations, and our cybersecurity: Strengthen privacy protections for both Americans and non-Americans, within the United States and extraterritorially. Provide for increased transparency around government surveillance, both from the government and companies. Recommit to the Internet Freedom agenda in a way that directly addresses issues raised by NSA surveillance, including moving toward international humanrights based standards on surveillance. Begin the process of restoring trust in cryptography standards through the National Institute of Standards and Technology. Ensure that the U.S. government does not undermine cybersecurity by inserting surveillance backdoors into hardware or software products. Help to eliminate security vulnerabilities in software, rather than stockpile them. Develop clear policies about whether, when, and under what legal standards it is permissible for the government to secretly install malware on a computer or in a network. Separate the offensive and defensive functions of the NSA in order to minimize conflicts of interest. 58/92 NSA Affirmative Economy Advantage SLUDL/NAUDL 2015-16 Answers to USA Freedom Act Solves (___) (__) Freedom Act insufficient to restore US technology reputation The Nation 15 June 11, 2015, http://www.cfr.org/latin-america-and-the-caribbean/snowden-come-between-us-latinamerica/p31109, “New Headlight;Study shows cost of whistle-blower Snowden's revelations to US tech firms” US technology companies are getting hit harder than anticipated by revelations about surveillance programmes led by the National Security Agency, a study showed yesterday. The study by the Information Technology and Innovation Foundation, a Washington think-tank, said the impact would be greater than its estimate nearly two years ago of losses for the cloud- computing sector. In 2013, the think-tank estimated that US cloud computing firms could lose between $22 billion and $35 billion (Bt739.8 billion and Bt1.1 trillion) in overseas business over three years. It now appears impossible to quantify the economic damage because the entire sector has been tarnished by the scandal from revelations in documents leaked by former NSA contractor Edward Snowden, the report said. "These revelations have fundamentally shaken international trust in US tech companies and hurt US business prospects all over the world," the report said. Study coauthor Daniel Castro said the impact is now open-ended, with the NSA scandal having tarnished a wide range of US tech firms. Since 2013, he said, "we haven't turned this around; it's not just cloud companies. It's all tech firms implicated by this," he said. "It doesn't show any signs of stopping." @New Subhead;New law insufficient @BT New Screen/briefs Text - no indent;The report said foreign customers are increasingly shunning US companies, and governments around the world "are using US surveillance as an excuse to enact a new wave of protectionist policies". One survey cited by the researchers found 25 per cent of businesses in Britain and Canada planned to pull company data out of the United States as a result of the NSA revelations. Some companies in Europe do not want their data hosted in North America due to these concerns, the researchers said. Meanwhile, foreign companies have used the revelations as a marketing opportunity. "There is also an increasingly distressing trend of countries, such as Australia, China, Russia, and India, passing laws that prevent their citizens' personal information from leaving the country's borders, effectively mandating that cloud computing firms build data centres in those countries or risk losing access to their markets." The report said several US tech firms including Apple and Salesforce have already started to build data centres abroad "to appease foreign watchdogs and privacy advocates". While this "data nationalism" may create some jobs in the short term, Castro said that countries enacting these policies "are hurting themselves in the long term by cutting themselves off from the best technology". Castro said the passage of a reform measure last week called the USA Freedom Act is not sufficient to repair the reputation of US tech firms. The report recommends further reforms including boosting transparency of surveillance practices, opposing government efforts to weaken encryption and strengthening its mutual legal assistance treaties with other nations. "Over the last few years, the US government's failure to meaningfully reform its surveillance practices has taken a serious economic toll on the US tech sector and the total cost continues to grow each day," Castro said. Castro said the USA Freedom Act, which curbs bulk data collection among its reforms, is "good legislation and a step in the right direction. We have ignored the economic impact of US surveillance". 59/92 NSA Affirmative Internet Freedom Advantage NAUDL 2015-16 Answers to Internet Freedom Doesn’t Spur Democracy (___) (__) US norms on internet freedom can change global behavior. Not all nations are holdouts and plan still moves the needle everywhere. Fontaine and Rogers, Senior Fellow & Research Assocaite at the Center for New American Security, 2011 (Richard & Will, “Internet Freedom A Foreign Policy Imperative in the Digital Age” – June, 2011 http://www.cnas.org/files/documents/publications/CNAS_InternetFreedom_FontaineRogers_0.pdf The Bush and Obama administrations have both sought to promote Internet freedom by shaping international norms. Developing international norms is a long-term, global objective. Some countries that currently repress that Internet access – like China, Iran and Burma – are unlikely to be moved by normative trends in the near term; statements at the United Nations and policy declarations supporting Internet freedom are highly unlikely to change their current policies. But promoting Internet freedom is not only a near-term effort, and current efforts may pay off in the long run. Many countries have not yet fully developed their own Internet policies or thought through all of the implications of Internet freedom and repression even in the short run – including states in Central Asia, the Middle East and Africa. Shaping the behavior of those states should be an important goal of the United States and likeminded partners. (__) Internet freedom solves. It is key to global democracy. Tkacheva et al., Researchers at the RAND Corporation, 2013 (Olesya, and Lowell H. Schwartz, Martin C. Libicki, Julie E. Taylor, Jeffrey Martini, and Caroline Baxter, RAND Corporation, Internet Freedom and Political Space, Report prepared for USDOS) Online information can undermine the stability of non- democratic regimes by triggering an information cascade. The impact of protests is frequently proportional to the number of protesters who appear on the streets. The Internet can facilitate social protests by enabling citizens to anonymously express their true opinions and coordinate collective action, which can create a domino effect. Online mobilization in both Egypt and Russia triggered a wave of protests with long-term consequences—most notably the stunningly swift collapse of the Mubarak regime. Although social media in Egypt did not cause the popular upris- ing that came to center in Tahrir Square, it substantially increased the number of people who participated in the first demonstration. The size of the crowd in the Square caught Egyptian authori- ties by surprise and triggered the defection of some high-ranking army officials. In Russia, the information about electoral fraud triggered a wave of online mobilization that manifested itself in a series of mass demonstrations. Syria’s activists used the Internet to publicize elite defection from the regime, albeit with more limited success against a brutal and determined foe. • The Internet can make political coalitions more inclusive by opening up deliberations that cut across socioeconomic cleav- ages, thereby spreading information to people who do not normally interact on a daily basis. This conclusion emerges pri- marily from the review of theoretical literature on the diffusion of information online and the literature on social movements. While weak ties facilitate the diffusion of information online, strong ties create peer pressure that contributes to offline social mobilization. 60/92 NSA Affirmative Internet Freedom Advantage NAUDL 2015-16 Answers to Internet Freedom is about Profits (___) (__) The US internet freedom agenda is about promoting human rights and freedom of expression. Sinha, Fellow at Human Rights Watch, 2015 (G. Alex From the article “Better Privacy Protections Key to US Foreign Policy Coherence” – Defense One – March 25th - http://www.defenseone.com/ideas/2015/03/better-privacy-protections-key-us-foreign-policycoherence/108469/) G. Alex Sinha, Aryeh Neier fellow with the US Program at Human Rights Watch and the Human Rights Program at the American Civil Liberties Union.. For all its interest in promoting human rights around the world, you’d think the United States would be more sensitive to the ways its own surveillance policies undermine those very rights. Over the last few years, U.S. officials say they have spent more than $125 million to advance Internet freedom, which the State Department describes as a “foreign policy priority.” The U.S. rightly links Internet freedom with the freedoms of expression, peaceful assembly, and association, as well as with the work of human rights defenders. It makes sense, therefore, that the U.S. also actively funds human rights defenders, and calls out other governments for mistreating them. Yet surveillance conducted by the U.S. government—some of it unconstitutional and contrary to international human rights law—compromises Internet freedom, undermines the rights the government seeks to promote, and directly harms human rights defenders. 61/92 NSA Affirmative Internet Freedom Advantage NAUDL 2015-16 Answers to International Surveillance matters more (___) (__) We’ve lost the moral high ground and ability to work with civil society groups around the world to ensure democratic progress. Deibert, director of the Citizen Lab @ School of Global Affairs, University of Toronto 2015, (Ron,. He was a co-founder and principal investigator of the OpenNet Initiative, 7-1-2015, "Cyberspace Under Siege," Journal Of Democracy, http://muse.jhu.edu/journals/journal_of_democracy/v026/26.3.deibert.html#back While the value of Snowden’s disclosures in helping to start a long-needed discussion is undeniable, the revelations have also had unintended [End Page 74] consequences for resurgent authoritarianism and cyberspace. First, they have served to deflect attention away from authoritarian-regime cyberespionage campaigns such as China’s. Before Snowden fled to Hong Kong, U.S. diplomacy was taking an aggressive stand against cyberespionage. Individuals in the pay of the Chinese military and allegedly linked to Chinese cyberespionage were finding themselves under indictment. Since Snowden, the pressure on China has eased. Beijing, Moscow, and others have found it easy to complain loudly about a double standard supposedly favoring the United States while they rationalize their own actions as “normal” great-power behavior and congratulate themselves for correcting the imbalance that they say has beset cyberspace for too long. Second, the disclosures have created an atmosphere of suspicion around Western governments’ intentions and raised questions about the legitimacy of the “Internet Freedom” agenda backed by the United States and its allies. Since the Snowden disclosures—revealing top-secret exploitation and disruption programs that in some respects are indistinguishable from those that Washington and its allies have routinely condemned—the rhetoric of the Internet Freedom coalition has rung rather hollow. In February 2015, it even came out that British, Canadian, and U.S. signals-intelligence agencies had been “piggybacking” on China-based cyberespionage campaigns—stealing data from Chinese hackers who had not properly secured their own command-and-control networks.28 Third, the disclosures have opened up foreign investment opportunities for IT companies that used to run afoul of national-security concerns. Before Snowden, rumors of hidden “backdoors” in Chinese-made technology such as Huawei routers put a damper on that company’s sales. Then it came out that the United States and allied governments had been compelling (legally or otherwise) U.S.-based tech companies to do precisely what many had feared China was doing—namely, installing secret backdoors. So now Western companies have a “Huawei” problem of their own, and Huawei no longer looks so bad. 62/92 NSA Affirmative Internet Freedom Advantage NAUDL 2015-16 Answers to US not modelled (___) (__) Domestic surveillance limits are modelled. Deeks, Associate Professor, University of Virginia Law School, 2015 (Ashley.. "An International Legal Framework for Surveillance." Virginia Journal of International Law 55 (2015): 2014-53) In considering the inspiration for the norms that should emerge, the Article argues that the most promising source of new international norms is domestic law. Domestic laws can and do serve as the basis for international legal developments, particularly in the face of highly politicized issues, non-reciprocal incentive structures, issue complexity, and different conceptions of the proper legal framework — all of which are present in the surveillance debate.5 Further, domestic surveillance laws have been test-driven in the real world and reflect concerted efforts by particular polities to balance liberty and security. As a result, the Article draws from the domestic surveillance laws of various states to extract six procedural principles that states should adopt on the international plane. The norms that first emerge will not immediately constitute customary international law (“CIL”), but will serve as the grain of sand around which the pearl of CIL can form. In effect, this Article rejects both an aggressively cynical approach to foreign surveillance and an unduly optimistic view that states will converge around robust international privacy protections in the short term. The cynics assume that whatever pressures currently exist to modify the status quo will diminish in short order, overtaken by subsequent geopolitical crises. 6 The optimists argue that states should develop the substantive principle of privacy contained in the International Covenant on Civil and Political Rights (“ICCPR”), and have robust aspirations for what that principle should contain.7 Both of these approaches are flawed, normatively and predictively. The cynics underestimate both the enduring nature of human rights pressures on states and the benefits to states of creating new international legal rules in this area. The optimists underestimate the difficulty of agreeing on concrete, substantive norms in a multilateral setting among states with varied incentives. For this reason, states should focus first on establishing procedural limitations that reduce (though not eliminate) differences between their treatment of citizens and foreigners. 63/92 NSA Affirmative Internet Freedom Advantage NAUDL 2015-16 Answers to Democracy doesn’t solve war (___) (__) Democracy incrementally reduces the risk of war and systemic harms Rummel, Professor of Political Science at the University of Hawaii, 2007 (R.J., 9/7, Why Freedom? Let Me Count the Reasons, http://freedomspeace.blogspot.com/2007/09/whyfreedom-let-me-count-reasons.html,) Democratically free people do not make war on each other Why? The diverse groups, cross-national bonds, social links, and shared values of democratic peoples sew them together; and shared liberal values dispose them toward peaceful negotiation and compromise with each other. It is as though the people of democratic nations were one society This truth that democracies do not make war on each other provides a solution for eliminating war from the world: globalize democratic freedom Second: The less free the people within any two nations are, the bloodier and more destructive the wars between them; the greater their freedom, the less likely such wars become And third: The more freedom the people of a nation have, the less bloody and destructive their wars What this means is that we do not have to wait for all, or almost all nations to become liberal democracies to reduce the severity of war. As we promote freedom, as the people of more and more nations gain greater human rights and political liberties, as those people without any freedom become partly free, we will decrease the bloodiness of the world’s wars. We have already seen this in the sharp decrease in world violence with the great increase in the number of democracies. In short: Increasing freedom in the world decreases the death toll of its wars. Surely, whatever reduces and then finally ends the scourge of war in our history, without causing a greater evil, must be a moral good. And this is freedom In conclusion, then, we have wondrous human freedom as a moral force for the good. Freedom produces social justice, creates wealth and prosperity, minimizes violence, saves human lives, and is a solution to war. In two words, it creates human security. Moreover, and most important: People should not be free only because it is good for them. They should be free because it is their right as human beings In opposition to freedom is power, its antagonist. While freedom is a right, the power to govern is a privilege granted by a people to those they elect and hold responsible for its use. Too often, however, thugs seize control of a people with their guns and use them to make their power total and absolute. Where freedom produces wealth and prosperity, such absolute power causes impoverishment and famine. Where freedom minimizes internal violence, eliminates genocide and mass murder, and solves the problem of war, such absolute power unleashes internal violence, murders millions, and produces the bloodiest wars. In short, power kills; absolute power kills absolutely. 64/92 NSA Affirmative Solvency SLUDL/NAUDL 2015-16 Answers to USA Freedom Act Solves (___) (__) Reforming PRISM is more important than metadata and the USA Freedom Act. Kaplan, Pulitzer Prize winning journalist, 2015 (Fred, 6-8-2015, "One Thing About the NSA That Should Still Worry Us," Slate Magazine, http://www.slate.com/articles/news_and_politics/war_stories/2015/06/the_national_security_agency_s_surveilla nce_and_the_usa_freedom_act_the.html) For now, surveillance through telephone metadata is pretty sparse. In 2012, the NSA queried the database for 288 U.S. telephone numbers. As a result of those queries, the agency passed just 12 tips to the FBI. None of those tips led to the capture of a single terrorist or the halting of a terrorist plot. In fact, according to President Obama’s independent commission on NSA reform, the telephone metadata program has never had any impact on countering terrorism. A separate program called PRISM—authorized under Section 702 of the Foreign Intelligence Surveillance Act—lets the NSA track foreign terrorists and adversaries by intercepting their Internet traffic as it zips through U.S.–based servers. (Because of the nature of the technology, about 80 percent of the world’s Internet traffic passes through U.S. servers at some point.) PRISM was another highly classified NSA program that Snowden uncovered. The Washington Post and the Guardian made it the subject of their Day 2 Snowden stories (right after the revelations about telephone metadata). Yet PRISM isn’t touched at all by the USA Freedom Act, nor does any serious politician propose overhauling it. This is the case, even though PRISM data-mining is a much bigger program than telephone metadata ever was, and it’s potentially more intrusive, since it’s hard to know whether, at first glance, an IP address belongs to an American or a foreigner. 65/92 NSA Affirmative Solvency SLUDL/NAUDL 2015-16 Answers to USA Freedom Act Solves (__) Section 702 needs to be limited, the Freedom Act did not go far enough. Vladeck, co-editor-in-chief of Just Security and Law Professor at American University, 2015, (Stephen,6-1-2015, "Forget the Patriot Act – Here Are the Privacy Violations You Should Be Worried About," Foreign Policy, https://foreignpolicy.com/2015/06/01/section-215-patriot-act-expires-surveillance-continuesfisa-court-metadata/) To put the matter bluntly, whereas the Section 215 debate has addressed whether the government can collect our phone records, Executive Order 12333 and the 2008 FISA Amendments Act allow the government to collect a lot of what we’re actually saying, whether on the phone, in our emails, or even to our search engines. There is no question that, from a privacy perspective, these programs are far more pernicious than what’s been pegged to Section 215. There is also no question that such collection raises even graver constitutional questions than the phone records program. Whereas there is an open debate over our expectation of privacy in the metadata we voluntarily provide to our phone companies, there’s no doubt that we have an expectation of privacy in the content of our private communications.Why, then, has all the fuss been around Section 215 and the phone records program, while the far more troubling surveillance authorities provided by Executive Order 12333 and the 2008 FISA Amendments Act have flown under the radar? Part of it may be because of the complexities described above. After all, it’s easy for people on the street to understand what it means when the government is collecting our phone records; it’s not nearly as obvious why we should be bothered by violations of minimization requirements. Part of it may also have to do with the government’s perceived intent. Maybe it seems more troubling when the government is intentionally collecting our phone records, as opposed to “incidentally” (albeit knowingly) collecting the contents of our communications. And technology may play a role, too; how many senders of emails know where the server is located on which the message is ultimately stored? If we don’t realize how easily our communications might get bundled with those of non-citizens outside the United States, we might not be worried about surveillance targeted at them. But whatever the reason for our myopic focus on Section 215, it has not only obscured the larger privacy concerns raised by these other authorities, but also the deeper lessons we should have taken away from Snowden’s revelations. However much we might tolerate, or even embrace, the need for secret government surveillance programs, it is all-but-inevitable that those programs will be stretched to — and beyond — their legal limits. That’s why it’s important not only to place substantive limits upon the government’s surveillance authorities, but also to ensure that they are subject to meaningful external oversight and accountability as well. And that’s why the denouement of Section 215 debate has been so disappointing. This should have been a conversation not just about the full range of government surveillance powers, including Executive Order 12333 and the 2008 FISA Amendments Act, but also about the role of the FISA Court and of congressional oversight in supervising those authorities. Instead, it devolved into an overheated debate over an over-emphasized program. Congress has tended to a paper cut, while it ignored the internal bleeding. Not only does the expiration of Section 215 have no effect on the substance of other surveillance authorities, it also has no effect on their oversight and accountability. 66/92 NSA Affirmative Solvency SLUDL/NAUDL 2015-16 Answers to Domestic Collection is Small (___) (__) Section 702 surveillance is very big and is more invasive. Goitein, Co-Director Brennan Center for Justice’s Liberty and National Security Program 2015, (Elizabeth, , 6-5-2015, "Who really wins from NSA reform?," MSNBC, http://www.msnbc.com/msnbc/freedom-act-who-really-wins-nsa-reform) More fundamentally, bulk collection of business records is only one of the many intelligence activities that abandoned the individualized suspicion approach after 9/11. Until a few years ago, if the NSA, acting within the United States, wished to obtain communications between Americans and foreigners, it had to convince the FISA Court that the individual target was a foreign power or its agent. Today, under Section 702 of the FISA Amendments Act, the NSA may target any foreigner overseas and collect his or her communications with Americans without obtaining any individualized court order. Under Executive Order 12333, which governs the NSA’s activities when it conducts surveillance overseas, the standards are even more lax. The result is mass surveillance programs that make the phone metadata program seem dainty in comparison. Even though these programs are nominally targeted at foreigners, they “incidentally” sweep in massive amounts of Americans’ data, including the content of calls, e-mails, text messages, and video chats. Limits on keeping and using such information are weak and riddled with exceptions. Moreover, foreign targets are not limited to suspected terrorists or even agents of foreign powers. As the Obama administration recently acknowledged, foreigners have privacy rights too, and the ability to eavesdrop on any foreigner overseas is an indefensible violation of those rights. Intelligence officials almost certainly supported USA Freedom because they hoped it would relieve the post-Snowden pressure for reform. Their likely long-term goal is to avoid changes to Section 702, Executive Order 12333, and the many other authorities that permit intelligence collection without any individualized showing of wrongdoing. Privacy advocates who supported USA Freedom did so because they saw it as the first skirmish in a long battle to rein in surveillance authorities. Their eye is on the prize: a return to the principle of individualized suspicion as the basis for surveillance. If intelligence officials are correct in their calculus, USA Freedom may prove to be a Pyrrhic victory. But if the law clears the way for further reforms across the full range of surveillance programs, history will vindicate the privacy advocates who supported it. The answer to what USA Freedom means for our liberties lies, not in the text of the law, but in the unwritten story of what happens next. 67/92 NSA Affirmative Solvency SLUDL/NAUDL 2015-16 Answers to Domestic Collection is Small (___) (__) Section 702 affects millions of internet users. Laperruque, Fellow on Privacy, Surveillance, and Security at Center for Democracy and Technology, 2014, (Jake, "Why Average Internet Users Should Demand Significant Section 702 Reform," Center For Democracy & Technology., 7-22-2014, https://cdt.org/blog/why-average-internet-users-should-demand-significantsection-702-reform/ The Washington Post recently released what may be the most comprehensive review of the impact of Section 702 of FISA – which authorizes the NSA’s PRISM and upstream programs – on average Internet users. The scale and sensitive nature of communications being collected should generate widespread concern regarding the law’s use, and create demand for reform. Fortunately, Congress can enact measures that limit the collateral damage to privacy needlessly caused by this over-broad surveillance law. Section 702 Programs Affect Millions of Average Internet Users While the government has framed Section 702 as a “targeted” program that primarily affects suspected terrorists rather than normal individuals – a sentiment echoed by the Privacy and Civil Liberties Oversight Board in a report which CDT and others roundly criticized – the Washington Post report tells a troublingly different story: Based on a study of the largest sample of Section 702 data analyzed to date, approximately 90% of the text messages, emails, instant messages, and other communications retained by NSA, even after the application of minimization procedures, are to or from accounts who are not surveillance targets. It is not surprising that a large portion of these accounts belong to non-targets; electronic surveillance of a target inevitably collects the communications of people who talk to the target about matters unrelated to the purpose of the surveillance. Considering the large number of individuals one regularly emails, texts, and calls, a 9:1 ratio does not seem that extreme. However, while this inevitable incidental collection might be tolerable in small levels when the surveillance target is suspected of wrongdoing and communications monitoring is approved by a judge, it is difficult to justify when the purpose of the surveillance is as broad as is authorized in Section 702, and the resulting scope is so enormous. Further, because the 9:1 ratio is based on “accounts,” it might significantly underscore the number of non-targeted individuals affected. As 89,138 “persons” were targets last year, the Post concluded communications from over 800,000 non-targeted accounts were retained. The actual number is likely much larger. As Julian Sanchez notes, while there are 89,138 persons targeted, most targeted persons (a term that can include corporations and organizations) have many electronic communications accounts, meaning the number of accounts targeted is likely much higher. This would place the number of non-targeted accounts to or from which communications were retained in the millions. 68/92 NSA Affirmative Solvency SLUDL/NAUDL 2015-16 Limiting Section 702 Solves (__) Limiting Section 702 searches will adequately constrain the NSA to protect citizens.. Human Rights Watch, 2014, "Letter to President Obama Urging Surveillance Reforms," 1-16-2014 https://www.hrw.org/news/2014/01/16/letter-president-obama-urging-surveillance-reforms Adopt the review group’s recommendation to limit the scope of collection under 702 and any other authority that authorizes surveillance abroad to what is “directed exclusively at the national security of the United States or [its] allies” and ensure that surveillance is not used for illegitimate ends such as commercial gain.[4] Under Section 702, the US can collect “foreign intelligence information.” But this term is defined extremely broadly to include things that need only “relate to” terrorism, intelligence activities of another government, the national defense, or the foreign affairs of the United States. The content of communications can be obtained, not just metadata, as can communications “about” the targets. Indeed, according to media reports based on documents leaked by former NSA contractor Edward Snowden, the NSA taps into main communication links of data centers around the world and collects millions of records every day, including metadata text, audio, and video.[5] This type of over-collection cannot possibly be proportionate or necessary to US national security goals. (__) Limiting surveillance to tangible threats is an effective reform. Nojeim, Director, Project on Freedom, Security & Technolog, 2014 Greg, y Comments To The Privacy And Civil Liberties Oversight Board Regarding Reforms To Surveillance Conducted Pursuant To Section 702 Of Fisa April 11, 2014 https://d1ovv0c9tw0h0c.cloudfront.net/files/2014/04/CDT_PCLOB-702-Comments_4.11.13.pdf To address the problem of overbreadth in Section 702 collection, PCLOB should recommend that Section 702 surveillance be conducted only for carefully defined national security purposes. While there are different ways to do this, the best way would be to turn the “use restrictions” in PPD-28 that govern bulk collection into the permissible purposes for Section 702 surveillance. This would require that collection pursuant to Section 702 only occur for purposes of detecting and countering: (1) espionage and other threats and activities directed by foreign powers or their intelligence services against the United States and its interests, (2) threats to the United States and its interests from terrorism, (3) threats to the United States and its interests from the development, possession, proliferation, or use of weapons of mass destruction, (4) cybersecurity threats, (5) threats to U.S. or allied Armed Forces or other U.S or allied personnel, and (6) transnational criminal threats, including illicit finance and sanctions evasion related to the other purposes named above. This change would provide significant comfort to non-U.S. persons abroad who are concerned about the impact on their human rights that Section 702 surveillance would otherwise have. Indeed, it would increase the likelihood that Section 702 surveillance would meet human rights standards. 69/92 NSA Affirmative Solvency SLUDL/NAUDL 2015-16 Plan Solves PRISM (___) (__) The plan would eliminate major parts of PRISM and Upstream collection. Liu, Nolan & Thompson, Legislative Attorneys at the Congressional Research Service 2015, (Edward C; Andrew and Richard M. “Overview of Constitutional Challenges to NSA Collection Activities” Congressional Research Service May 21, 2015 http://fas.org:8080/sgp/crs/intel/R43459.pdf) PRISM and Upstream Acquisition of Internet Communications Contemporaneously with the origination of the telephony metadata program in 2001, the NSA also began acquiring Internet-based communications of overseas targets without the use of a traditional law enforcement warrant or an electronic surveillance order under Title I of FISA.90 Ultimately, new statutory authority for this type of acquisition was provided, at first, temporarily under the Protect America Act (PAA) of 2007;91 and on a longer term basis by the FAA.92 According to a partially declassified 2011 opinion from the FISC, NSA collected 250 million Internet communications per year under this program.93 Of these communications, 91% were acquired “directly from Internet Service Providers,” referred to as “PRISM collection.”94 The other 9% were acquired through what NSA calls “upstream collection,” meaning acquisition while Internet traffic is in transit from one unspecified location to another.95 NSA also has two methods for collecting information about a specific target: “to/from” communications collection, in which the target is the sender or receiver of the Internet communications; and “about” communications collection, in which the target is only mentioned in communications between non-targets.96 The Obama Administration also acknowledged to the FISC that technical limitations in the “upstream” collection result in the collection of some communications that are unrelated to the target or that may take place entirely between persons located in the United States.97 The PRISM and upstream collections differ from the telephony metadata program in two key respects. First, the PRISM and upstream collections acquire the contents of those communications. Second, as this program targets the “to/from” and “about” communications of foreigners who are abroad, the collection of Internet-based communications may be considered by some to be more discriminating than the bulk collection of telephony metadata. . 70/92 NSA Affirmative Solvency SLUDL/NAUDL 2015-16 Answers to Reforming domestic surveillance alone doesn’t solve (__) (__) Domestic surveillance and foreign surveillance standards shouldn’t be exactly the same, innovation in domestic protections create broader privacy rights. Margulies, professor at Roger Williams University School of Law,, 2015 (Peter, 7-4-2015, "Sweeping Claims and Casual Legal Analysis in the Latest U.N. Mass Surveillance Report," Lawfare, http://www.lawfareblog.com/sweeping-claims-and-casual-legal-analysis-latest-un-mass-surveillancereport Ironically, the Emmerson report's insistence on identical standards for domestic and international surveillance actually sabotages efforts to protect privacy. States are most likely to try innovative measures to protect privacy when these measures protect state nationals within the state’s territory. If those measures also keep the homeland safe, a state may well expand them to include aspects of international surveillance. Enforcing a lockstep approach to domestic and international surveillance chills that experimentation. (__) Structural differences make domestic surveillance different. Posner, Professor of Law, University of Chicago, 2014, (Eric A., Statement to the Privacy & Civil Liberties Oversight Board March 14, 2014 http://lawfare.s3-us-west2.amazonaws.com/staging/s3fs-public/uploads/2014/03/Eric-A.-Posner.pdf) The case for requiring the U.S. government to respect the privacy of Americans is greater than the case for requiring it to respect the privacy of foreigners because the U.S. government has coercive power over Americans, while it almost never does over foreigners. Thus, the U.S. government could misuse private information in order to inflict harm against Americans, but not against foreigners, who benefit from the protection of their own governments. 71/92 NSA Affirmative Solvency SLUDL/NAUDL 2015-16 Answers to Reforming domestic surveillance alone doesn’t solve (___) (__) Obama has already extended equal privacy to non-US persons, that solves foreign privacy invasions. Ratnam, senior staff writer at Foreign Policy, 2015, (Gopal, 2-3-2015, "Obama’s Surveillance Reform Extends Unmatched Privacy to Foreigners," Foreign Policy, http://foreignpolicy.com/2015/02/03/obamas-surveillance-reform-extends-unmatched-privacy-to-foreigners/) Though criticized by advocates for not going far enough, an Obama administration report Tuesday on steps to protect privacy and civil liberties has nevertheless achieved at least one thing: extending to foreigners the same protections available to Americans. The report on surveillance reform, issued by the Office of the Director of National Intelligence (ODNI), banned U.S. spy agencies from disseminating information about foreigners to other countries’ intelligence agencies without considering their privacy. “Intelligence community personnel are now specifically required to consider the privacy interests of non-U.S. persons when drafting and disseminating intelligence,” the report said. The report on surveillance reform also said that U.S. intelligence agencies last year obtained secret court permissions to seize phone records in 164 cases where they had sufficient suspicion to seek such approvals. The number of targets tracked last year fell from the 423 queried by intelligence agencies in 2013, according to data released by the intelligence. Following former government contractor Edward Snowden’s revelations in 2013 that U.S. spy agencies were snooping in on emails and phone calls of foreigners, including several heads of state, President Barack Obama in January 2014 said U.S. intelligence agencies must protect the privacy of foreigners on par with that of Americans. “You can’t simply say, ‘Oh, this is not a U.S. person’ and disseminate his or her personal information,” the ODNI’s top lawyer, Bob Litt, told reporters. Instead, Litt said, officials must examine a non-citizen’s information and determine if releasing it is essential for foreign intelligence purposes. The decision to give equal privacy protections to foreigners is unprecedented in the annals of global spying, said David Medine, chairman of the Privacy and Civil Liberties Oversight Board, an independent U.S. agency charged with protecting such rights. “There’s no country on the planet that has gone this far to improve the treatment of non-citizens in government surveillance,” Medine said. “That alone is remarkable after the events of the last year and half because in most countries non-citizens are fair game” for spying. 72/92 NSA Affirmative Solvency SLUDL/NAUDL 2015-16 Answers to Domestic alone doesn’t solve (__) Domestic surveillance limits are modelled, that solves foreign surveillance. Deeks, Associate Professor, University of Virginia Law School, 2015 (Ashley.. "An International Legal Framework for Surveillance." Virginia Journal of International Law 55 (2015): 2014-53) In considering the inspiration for the norms that should emerge, the Article argues that the most promising source of new international norms is domestic law. Domestic laws can and do serve as the basis for international legal developments, particularly in the face of highly politicized issues, non-reciprocal incentive structures, issue complexity, and different conceptions of the proper legal framework — all of which are present in the surveillance debate.5 Further, domestic surveillance laws have been test-driven in the real world and reflect concerted efforts by particular polities to balance liberty and security. As a result, the Article draws from the domestic surveillance laws of various states to extract six procedural principles that states should adopt on the international plane. The norms that first emerge will not immediately constitute customary international law (“CIL”), but will serve as the grain of sand around which the pearl of CIL can form. In effect, this Article rejects both an aggressively cynical approach to foreign surveillance and an unduly optimistic view that states will converge around robust international privacy protections in the short term. The cynics assume that whatever pressures currently exist to modify the status quo will diminish in short order, overtaken by subsequent geopolitical crises. 6 The optimists argue that states should develop the substantive principle of privacy contained in the International Covenant on Civil and Political Rights (“ICCPR”), and have robust aspirations for what that principle should contain.7 Both of these approaches are flawed, normatively and predictively. The cynics underestimate both the enduring nature of human rights pressures on states and the benefits to states of creating new international legal rules in this area. The optimists underestimate the difficulty of agreeing on concrete, substantive norms in a multilateral setting among states with varied incentives. For this reason, states should focus first on establishing procedural limitations that reduce (though not eliminate) differences between their treatment of citizens and foreigners. 73/92 NSA Affirmative Solvency SLUDL/NAUDL 2015-16 Answers to Circumvention (___) (__) Restoring strong regulatory language is sufficient to end circumvention. Granick, Director of Civil Liberties at the Stanford Center for Internet and Society, 2014 (Jennifer, “USA Freedom Act: Oh, Well. Whatever. Nevermind.” – Just Security - May 21, 2014 http://justsecurity.org/10675/usa-freedom-act-oh-well-whatever-nevermind/ The initially promising USA Freedom Act could have ended the previously secret government practices of collecting Americans’ calling records, internet transactional information and who knows what else in bulk. Today’s version would allow broad collection to continue under the guise of reform. The initial version of the bill would have reinforced existing statutory language requiring a showing of “relevance to an authorized investigation” before agents can get an order requiring production of business records, dialing and routing information, and other data, and would have added other limits to ensure massive collection would stop. It also would have implemented mild reforms to content surveillance under section 702 of the FISA Amendments Act, stopping “back door” searches for Americans’ communications. Last week, a Managers’ Amendment watered those provisions down, substituting new language that would allow agents to use a “specific selection term” as the “basis for production”. The bill defined “specific selection term” as something that “uniquely describe[s] a person, entity, or account.” Given the intelligence community’s success at getting FISA judges to reinterpret obvious language—e.g. “relevance”—in counterintuitive ways, people wondered what this new language might mean. There’s deep public mistrust for the intelligence community and for the FISA court, which conspired to allow bulk collection under spurious legal justifications for years. Worse, there’s deep public mistrust for the law itself, since the intelligence community’s “nuanced” definitions of normal words have made the public realize that they do not understand the meaning of words like “relevance”, “collection”, “bulk”, or “target”. 74/92 NSA Affirmative Solvency SLUDL/NAUDL 2015-16 Answers to Circumvention (___) (__) Non-compliance is unlikely. Deeks, Associate Professor, University of Virginia Law School, 2015 (Ashley.. "An International Legal Framework for Surveillance." Virginia Journal of International Law 55 (2015): 2014-53) There is a danger is that states will adopt these norms publicly but continue to conduct foreign surveillance much as they do today. Because it may be relatively difficult to ascertain whether states actually are complying with some of the six norms, there is ample room for a hypocritical embrace of the norms without a corresponding change in behavior. Two factors potentially mitigate this concern. The first is that many Western (and some non-Western) states refuse to adopt international norms publicly unless they genuinely plan to comply with them.288 In this view, formally accepting international rules without the intention or ability to comply with them serves to weaken, not strengthen, the international regime. Where these states view the international rules at issue as beneficial, they view their ability to comply with those rules as a sine qua non for formally adopting them in the first place. The second mitigating factor is that public revelations about surveillance programs are on the rise. As a result, non-compliance with stated norms is more likely to come to light. In democracies, non-compliance with publicly accepted norms is more costly to states, whose publics are accustomed to holding their governments to the laws they have adopted. Citizens are more likely to call for compliance with domestic laws than international laws, yet most states have a contingent of elites who seek to hold their governments accountable for international legal compliance as well. 75/92 NSA Affirmative Solvency SLUDL/NAUDL 2015-16 Answers to Circumvention (__) The NSA has no interest in subverting the law, circumvention doesn’t make sense. Ackerman, National Security editor for the The Guardian, 2015, (Spencer, 6-1-2015, "Fears NSA will seek to undermine surveillance reform," Guardian, http://www.theguardian.com/us-news/2015/jun/01/nsa-surveillance-patriot-act-congress-secret-law) Despite that recent history, veteran intelligence attorneys reacted with scorn to the idea that NSA lawyers will undermine surveillance reform. Robert Litt, the senior lawyer for director of national intelligence, James Clapper, said during a public appearance last month that creating a banned bulk surveillance program was “not going to happen”. “The whole notion that NSA is just evilly determined to read the law in a fashion contrary to its intent is bullshit, of the sort that the Guardian and the left – but I repeat myself – have fallen in love with. The interpretation of 215 that supported the bulk collection program was creative but not beyond reason, and it was upheld by many judges,” said the former NSA general counsel Stewart Baker, referring to Section 215 of the Patriot Act. This is the section that permits US law enforcement and surveillance agencies to collect business records and expired at midnight, almost two years after the whistleblower Edward Snowden revealed to the Guardian that the Patriot Act was secretly being used to justify the collection of phone records from millions of Americans. With one exception, the judges that upheld the interpretation sat on the non-adversarial Fisa court, a body that approves nearly all government surveillance requests and modifies about a quarter of them substantially. The exception was reversed by the second circuit court of appeals. Baker, speaking before the Senate voted, predicted: “I don’t think anyone at NSA is going to invest in looking for ways to defy congressional intent if USA Freedom is adopted.” (__) Noncompliance isn’t a reason not to do the plan — the real problems are the laws that authorize the surveillance. Jaffer ACLU Deputy Legal Director and Director of ACLU Center for Democracy, 2013 (Jameel “"There Have Been Some Compliance Incidents": NSA Violates Surveillance Rules Multiple Times a Day,” ACLU Blog, August 16th, https://www.aclu.org/blog/there-have-been-some-compliance-incidents-nsaviolates-surveillance-rules-multiple-times-day?redirect=blog/national-security/nsa-privacy-violations-evenmore-frequent-we-imagined, Accessed 06-05-2015) One final note: The NSA's noncompliance incidents are a big deal, but we shouldn't let them become a distraction. The far bigger problem is with the law itself, which gives the NSA almost unchecked authority to monitor Americans' international calls and emails. The problem arises, in other words, not just from the NSA's non-compliance with the law, but from its compliance with it. 76/92 NSA Affirmative Solvency SLUDL/NAUDL 2015-16 Answers to Circumvention (__) The NSA doesn’t try to circumvent. McCutcheon, editor for Congressional Quarterly , 2013 (Chuck (2013, August 30). Government surveillance. CQ Researcher, 23, 717-740. Retrieved from http://library.cqpress.com/) Deputy Attorney General James Cole noted that the FISA court approves only requests that meet the standard of a “reasonable, articulable suspicion” of potential terrorist activity. “Unless you get that step made, you cannot enter that database and make a query of any of this data,” he said . Footnote 33 Timothy Edgar, a former American Civil Liberties Union (ACLU) attorney who later worked for the director of National Intelligence as its first deputy for civil liberties, says he was surprised — and that Americans would be as well — by how cautious spy agencies are about using their surveillance powers. When he was at the ACLU, “I thought that the government would take whatever power you had given them and always interpret it in the broadest possible way,” says Edgar, who now teaches national security and technology law at Brown University. But he said he came to view government officials as “conscientious” and realized they did not habitually interpret their powers as broadly as civil liberties groups fear. 77/92 NSA Affirmative Off Case Answers SLUDL/NAUDL 2015-16 Topicality Domestic (JV & V Only) 1. We Meet —the plan limits the surveillance of domestic communication which the NSA has been collecting “incidentally” via Section 702. Tushnet 15, Mark professor of law at Harvard Law School., 2015, "The Presidential Empire," Dissent Magazine, http://www.dissentmagazine.org/article/the-presidential-empire Edward Snowden’s revelations brought home the fact that one of the main tasks of the National Surveillance State is indeed surveillance. Much of what Snowden brought to public attention were modernized versions of classical espionage conducted by U.S. spies outside the United States. That sort of espionage was completely consistent with U.S. law. Technology meant, though, that surveillance outside the United States inevitably included information about activities by U.S. citizens both outside the nation’s borders and within them. The statutes creating the framework for this surveillance have provisions aimed at limiting its domestic use to cases with a substantial connection to international terrorism. But, Snowden showed us, those provisions were not fully effective, and the scale of modern surveillance meant that even reasonably effective protections against domestic surveillance still left large numbers of innocent people subject to it. 2. Counter-Interpretation – Domestic surveillance deals with information transmitted within a country HRC 14 Human Rights Council 2014 IMUNC2014 https://imunc.files.wordpress.com/2014/05/hrc-study-guide.pdf Domestic surveillance: Involves the monitoring, interception, collection, analysis, use, preservation, retention of, interference with, or access to information that includes, reflects, or arises from or a person’s communications in the past, present or future with or without their consent or choice, existing or occurring inside a particular country. 3. Prefer our interpretation— a) Aff ground—they over limit because they take out all NSA and surveillance agency affs, which are core of the topic b) They overlimit—very few affs that meet their interpretation would also have solvency advocates. 4. Default to reasonability—we don’t have to win offense on t, but competing interpretations causes a race to the bottom 78/92 NSA Affirmative Off Case Answers SLUDL/NAUDL 2015-16 Topicality NSA Can be Domestic (JV & V) (___) (__) Even if the law tried to limit the NSA’s domestic surveillance, it didn’t work. Vladeck, professor of law at American University, 2015, (Stephen, co-editor-in-chief of Just Security. Steve is a Washington College of Law, 6-1-2015, "Forget the Patriot Act – Here Are the Privacy Violations You Should Be Worried About," Foreign Policy, https://foreignpolicy.com/2015/06/01/section-215-patriot-act-expires-surveillance-continues-fisa-courtmetadata/) The answer, we now know, has everything to do with technology. Although the government is only allowed to “target” non-citizens outside the United States, it is inevitable, given how it collects information under both of these regimes, that the communications of U.S. citizens and non-citizens lawfully present in the United States will also be collected, albeit “incidentally,” as the government puts it. After all, when thousands of unrelated emails and other electronic communications are bundled together in a packet that travels through an Internet switch that’s physically located in the United States (for the 2008 statute) or overseas (for Executive Order 12333), it’s simply not possible for the government to only collect the communications between non-U.S. citizens and leave the others untouched, any more so than it’s possible for a vacuum to segregate particles of dirt. To be sure, the U.S. government doesn’t dispute that it routinely collects the communications of U.S. citizens. Instead, it has argued that any potential for abuse is mitigated by so-called “minimization requirements” — procedural rules that require the relevant intelligence agency to take steps to avoid the improper retention and use of communications collected under these authorities. The government’s defense, as we’ve come to learn, is flawed in two vital respects: First, as several since-disclosed opinions from the FISA Court have made clear, the government’s minimization requirements under the 2008 statute were often too skimpy, allowing the retention and use of information that both the statute and the Fourth Amendment prohibit. Second — and perhaps more importantly — even where the minimization rules were legally sufficient, there have been numerous instances in which government officials violated them, with the FISA Court only discovering the abuses after they were voluntarily reported by Justice Department lawyers. As a result, the government collected and retained a large volume of communications by U.S. citizens that neither Congress nor the Constitution allowed it to acquire 79/92 NSA Affirmative Off Case Answers SLUDL/NAUDL 2015-16 Answers to – Topicality Domestic (JV & V) (___) (__) Modern communication blurs the line between Foreign and Domestic. Sanchez, Senior Fellow at the Cato Institute, 2014 Julian,, 6-5-2014, "Snowden: Year One," Cato Unbound, http://www.cato-unbound.org/2014/06/05/juliansanchez/snowden-year-one The second basic fact is that modern communications networks obliterate many of the assumptions about the importance of geography that had long structured surveillance law. A “domestic” Internet communication between a user in Manhattan and a server in Palo Alto might, at midday in the United States, be routed through nocturnal Asia’s less congested pipes, or to a mirror in Ireland, while a “foreign” e-mail service operated from Egypt may be hosted in San Antonio. “What we really need to do is all the bad guys need to be on this section of the Internet,” former NSA director Keith Alexander likes to joke. “And they only operate over here. All good people operate over here. All bad guys over here.” It’s never been quite that easy—but General Alexander’s dream scenario used to be closer to the truth. State adversaries communicated primarily over dedicated circuits that could be intercepted wholesale without much worry about bumping into innocent Americans, whereas a communication entering the United States could generally be presumed to be with someone in the United States. The traditional division of intelligence powers by physical geography—particularized warrants on this side of the border, an interception free-for-all on the other—no longer tracks the reality of global information flows. 80/92 NSA Affirmative Off Case Answers SLUDL/NAUDL 2015-16 Answers to —Topicality Domestic (JV & V) (___) (__) “Domestic” has no limiting value — the NSA has a classified definition of “US person.” Schulberg and Reilly, reporters for the Huffington Post, 2015 (Jessica and Ryan J, reporter who covers the Justice Department and the Supreme Court for The Huffington Post, 2015 (“Watchdog Finds Huge Failure In Surveillance Oversight Ahead Of Patriot Act Deadline,” Huffington Post, May 21st, Available Online at http://www.huffingtonpost.com/2015/05/21/section-215oversight_n_7383988.html, internal Tweet URL https://twitter.com/AlexanderAbdo/status/601395637184286720, Accessed 06-05-2015) The government's requests were also not limited to material about individuals involved in an FBI investigation. And while defendants of the program insist that information on Americans is gathered as an incidental byproduct rather than a targeted effort, Abdo noted that the definition of a “U.S. person” is still classified in the recently released report: Alex Abdo @AlexanderAbdo The FBI has a classified understanding of "U.S. persons" . . . 7:34 AM - 21 May 2015 81/92 NSA Affirmative Off Case Answers SLUDL/NAUDL 2015-16 NSA Surveillance doesn’t stop terrorism (Terror DA Ans) (___) Their argument is a fallacy. Surveillance doesn’t work, hasn’t stopped terrorism and their evidence is propaganda. Van Buren, State Department whistleblower, 2014, (Peter Van Buren blew the whistle on State Department waste and mismanagement during Iraqi reconstruction in his first book, We Meant Well: How I Helped Lose the Battle for the Hearts and Minds of the Iraqi People. 114-2014, "Peter Van Buren: We Have to Destroy Our Constitution to Save It," Guernica / A Magazine of Art & Politics, https://www.guernicamag.com/daily/peter-van-buren-we-have-to-destroy-our-constitution-tosave-it/) 9) We’ve stayed safe. Doesn’t that just prove all the government efforts have worked? No, that’s called false causality. There simply is no evidence that it’s true, and much to the contrary. It’s the same as believing government efforts have prevented Martian attacks or wild lions in our bedrooms. For one thing, we already know that more NSA spying would not have stopped 9/11; most of the needed information was already held by the U.S. government and was simply not properly shared or acted upon. 9/11 was a policy failure, not a matter of too-little snooping. Today, however, it remains a straw-man justification for whatever the NSA wants to do, a way of scaring you into accepting anything from the desecration of the Fourth Amendment to taking off our shoes at airport security. But the government uses this argument endlessly to promote what it wants to do. Even the NSA’s talking points recommend their own people say: “I much prefer to be here today explaining these programs, than explaining another 9/11 event that we were not able to prevent.” At the same time, despite all this intrusion into our lives and the obvious violations of the Fourth Amendment, the system completely missed the Boston bombers, two of the dumbest, least sophisticated bro terrorists on the planet. Since 9/11, we have seen some 364,000 deaths in our schools, workplaces, and homes caused by privately owned firearms, and none of the spying or surveillance identified any of the killers in advance. Maybe we should simply stop thinking about all this surveillance as a matter of stopping terrorists and start thinking more about what it means to have a metastasized global surveillance system aimed at spying on us all, using a fake argument about the need for 100% security in return for ever more minimal privacy. So much has been justified in these years—torture, indefinite detention, the Guantanamo penal colony, drone killings, wars, and the use of Special Operations forces as global assassination teams—by some version of the so-called ticking time bomb scenario. It’s worth getting it through our heads: there has never been an actual ticking time bomb scenario. The bogeyman isn’t real. There’s no monster hiding under your bed. 82/92 NSA Affirmative Off Case Answers SLUDL/NAUDL 2015-16 NSA Surveillance does not stop terrorism- extension (__) Mass Surveillance is less effective than traditional law enforcement. Schneier, fellow at Center for Internet and Society at Harvard Law School, 2015 (Bruce 3/2/15, Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World.) Mass surveillance didn’t catch underwear bomber Umar Farouk Abdulmutallab in 2006, even though his father had repeatedly warned the U.S. government that he was dangerous. And the liquid bombers (they’re the reason governments prohibit passengers from bringing large bottles of liquids, creams, and gels on airplanes in their carry-on luggage) were captured in 2006 in their London apartment not due to mass surveillance but through traditional investigative police work. Whenever we learn about an NSA success, it invariably comes from targeted surveillance rather than from mass surveillance. One analysis showed that the FBI identifies potential terrorist plots from reports of suspicious activity, reports of plots, and investigations of other, unrelated, crimes. This is a critical point. Ubiquitous surveillance and data mining are not suitable tools for finding dedicated criminals or terrorists. We taxpayers are wasting billions on mass-surveillance programs, and not getting the security we’ve been promised. More importantly, the money we’re wasting on these ineffective surveillance programs is not being spent on investigation, intelligence, and emergency response: tactics that have been proven to work. The NSA's surveillance efforts have actually made us less secure. Mass surveillance and data mining are much more suitable for tasks of population discrimination: finding people with certain political beliefs, people who are friends with certain individuals, people who are members of secret societies, and people who attend certain meetings and rallies. Those are all individuals of interest to a government intent on social control like China. The reason data mining works to find them is that, like credit card fraudsters, political dissidents are likely to share a well-defined profile. Additionally, under authoritarian rule the inevitable false alarms are less of a problem; charging innocent people with sedition instills fear in the populace. 83/92 NSA Affirmative Off Case Answers SLUDL/NAUDL 2015-16 Surveillance causes false positives NSA surveillance fails to prevent terrorism – false positives overwhelm government resources. Schneier, fellow at Center for Internet and Society at Harvard Law School, 2015 (Bruce 3/2/15, Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World.) The US intelligence community also likens finding a terrorist plot to looking for a needle in a haystack. And, as former NSA director General Keith Alexander said, “you need the haystack to find the needle.” That statement perfectly illustrates the problem with mass surveillance and bulk collection. When you’re looking for the needle, the last thing you want to do is pile lots more hay on it. More specifically, there is no scientific rationale for believing that adding irrelevant data about innocent people makes it easier to find a terrorist attack, and lots of evidence that it does not. You might be adding slightly more signal, but you’re also adding much more noise. And despite the NSA’s “collect it all” mentality, its own documents bear this out. The military intelligence community even talks about the problem of “drinking from a fire hose”: having so much irrelevant data that it’s impossible to find the important bits. We saw this problem with the NSA’s eavesdropping program: the false positives overwhelmed the system. In the years after 9/11, the NSA passed to the FBI thousands of tips per month; every one of them turned out to be a false alarm. The cost was enormous, and ended up frustrating the FBI agents who were obligated to investigate all the tips. We also saw this with the Suspicious Activity Reports —or SAR — database: tens of thousands of reports, and no actual results. And all the telephone metadata the NSA collected led to just one success: the conviction of a taxi driver who sent $8,500 to a Somali group that posed no direct threat to the US — and that was probably trumped up so the NSA would have better talking points in front of Congress. 84/92 NSA Affirmative Off Case Answers SLUDL/NAUDL 2015-16 Mass Surveillance creates false positives- extensions (__) Surveillance causes false positives that overwhelm law enforcement. Parra-Arnau and Castelluccia, Privatics research team, 2015 (Javier & Claude, “Dataveillance and the False-Positive Paradox”. 2015. INRIA Grenoble - Rhône-Alpes (France), https://hal.archives-ouvertes.fr/hal-01157921/document) We observe an extremely large number of false positives, except in the scenario where the distributions of terrorists and innocents are orthogonal, as effectively captured by the cosine distance. In order to be orthogonal, the terrorist profiles and features have to be unique and very distinctive from other people profiles. Defining such profiles is challenging since scientists do not have access to the data of many terrorists. Besides, current results tend to show that terrorists have personality traits that are indistinguishable from traits of the general population [11]. Also, it is very likely that terrorists will use tools such as encryption tools or proxies, in order to perturb their profiles. • Our results show that the total cost increases linearly with the ratio of terrorists, but the rate of increase is relatively low in the six scenarios considered. As depicted in Fig. 7, the total cost is similar regardless of the percentage of terrorists. This is a quite interesting observation because this means that, when the security agency has to decide the 9 budget, it will not need to be very accurate in estimating the percentage of terrorists within the population. On the other hand, this figure also shows that the efficiency of the system increases with the number of suspects, but is very low when the number of terrorist is small compared to the population size, which is fortunately the case. Mass surveillance of the entire population is logically sensible only if the number of persons to identified is high, which happens in McCarthy-type national paranoia or political espionage [12]. In closing, this paper demonstrates that dataveillance is not a very economical solution to fight against terrorism. More false positive will only overstress technologies, thus causing even more work for signalsintelligence agents, who are already overloaded [13]. In fact, the Charlie Hebdo terrorists were known by the French security agency prior to their attack. They were not followed and tracked anymore for budget and resource reasons. One might wonder how a dataveillance system that generates so many false positive, and is so easy to circumvent, will help improving the situation. 85/92 NSA Affirmative Off Case Answers SLUDL/NAUDL 2015-16 Surveillance creates too much data (___) Mass surveillance creates a Tsunami of data, undermining counterterror efforts. Maass , national security reporter for The Intercept, 2015 (Peter , 5-28-2015, "Inside NSA, Officials Privately Criticize "Collect It All" Surveillance," Intercept, https://firstlook.org/theintercept/2015/05/28/nsa-officials-privately-criticize-collect-it-all-surveillance/) AS MEMBERS OF CONGRESS struggle to agree on which surveillance programs to re-authorize before the Patriot Act expires, they might consider the unusual advice of an intelligence analyst at the National Security Agency who warned about the danger of collecting too much data. Imagine, the analyst wrote in a leaked document, that you are standing in a shopping aisle trying to decide between jam, jelly or fruit spread, which size, sugar-free or not, generic or Smucker’s. It can be paralyzing. “We in the agency are at risk of a similar, collective paralysis in the face of a dizzying array of choices every single day,” the analyst wrote in 2011. “’Analysis paralysis’ isn’t only a cute rhyme. It’s the term for what happens when you spend so much time analyzing a situation that you ultimately stymie any outcome …. It’s what happens in SIGINT [signals intelligence] when we have access to endless possibilities, but we struggle to prioritize, narrow, and exploit the best ones.” The document is one of about a dozen in which NSA intelligence experts express concerns usually heard from the agency’s critics: that the U.S. government’s “collect it all” strategy can undermine the effort to fight terrorism. The documents, provided to The Intercept by NSA whistleblower Edward Snowden, appear to contradict years of statements from senior officials who have claimed that pervasive surveillance of global communications helps the government identify terrorists before they strike or quickly find them after an attack. The Patriot Act, portions of which expire on Sunday, has been used since 2001 to conduct a number of dragnet surveillance programs, including the bulk collection of phone metadata from American companies. But the documents suggest that analysts at the NSA have drowned in data since 9/11, making it more difficult for them to find the real threats. The titles of the documents capture their overall message: “Data Is Not Intelligence,” “The Fallacies Behind the Scenes,” “Cognitive Overflow?” “Summit Fever” and “In Praise of Not Knowing.” Other titles include “Dealing With a ‘Tsunami’ of Intercept” and “Overcome by Overload?” 86/92 NSA Affirmative Off Case Answers SLUDL/NAUDL 2015-16 Surveillance creates bad data (___) The NSA’s collect all the data strategy fails to find terrorists and instead creates incentives to find imaginery needles in the haystack of data. Hu, Assistant Professor of Law, Washington and Lee School of Law, 2015 (Margaret,. "Small Data Surveillance v. Big Data Cybersurveillance." Pepp. L. Rev. 42 (2015): 773-883.) As discussed above, big data cybersurveillance and mass dataveillance depend upon a “collect-it-all” approach or a “connect-the-dots” theory of mass surveillance.271 This new approach to intelligence gathering is highly controversial.272 Levinson-Waldman has explained that it is a put-the- ”haystackbefore-the-needle approach to information gathering.”273 Stephen Vladeck framed the controversy in this way: there is a presumption that there is, in fact, a needle in the haystack.274 Vladeck’s point appears to be that presuming there is a needle in the haystack creates a justification for the view that all persons are suspects. Also worthy of caution is the fact that this presumption presents the potential for multiple challenges,275 including integrating biases into datadriven systems (e.g., confirmation bias, implicit bias, cognitive bias); path dependency (e.g., building systems to guarantee a correlative “hit” or “miss” that is intended to indicate data is suspicious; and assuming statistical certainty that suspicious data proves guilt of terroristic or criminal threat); overreliance on automation and risk of undertrained analysts; and exacerbation of perverse incentives (e.g., metrics of success designed to track number of suspects identified rather than assess whether intelligence can independently verify suspect classification). In other words, presuming that there is a digitally constructed needle (e.g., suspect or terrorist target or precrime-preterrorist threat that can be digitally identified through big data tools) in the government’s digitally constructed haystack276 (e.g., government’s attempt to store and analyze all digitally produced data in order to, purportedly, preempt crime and terrorism)277 can create incentives to construct imaginary needles. 87/92 NSA Affirmative Off Case Answers SLUDL/NAUDL 2015-16 Answer to: would have solved 9/11 (__) Would not have solved 9/11. Geiger, Advocacy Director & Senior Counsel at Center for Democracy & Technology, 2015. (Harley, 5-11-2015, "Senators’ Questionable Claims about NSA Bulk Collection," Lawfare, http://www.lawfareblog.com/2015/05/senators-questionable-claims-about-nsa-bulk-collection/) Claim 2: The bulk collection program could have stopped 9/11. “Here is the truth. If this program had existed before 9/11, it is quite possible we would have known that 9/11 hijacker Khalid Al Mihdhar was living in San Diego and was making phone calls to an Al Qaeda safe house in Yemen.” – Senator Marco Rubio A bulk collection program was not necessary to find Al Mihdhar prior to 9/11. As the PCLOB report details, the NSA had already begun intercepting calls to and from the safe house in Yemen in the late 1990s. Since the government knew the number of the safe house, and Al Mihdhar was calling that number, it would only be necessary to collect the phone records of the safe house to discover Al Mihdhar in San Diego. This is, in fact, an example of how targeted surveillance would have been more effective than bulk collection. The 9/11 Commission Report and other sources note that the CIA was aware of Mihdhar well before the attack and missed multiple opportunities to deny him entry to the U.S. or intensify their surveillance of him. 88/92 NSA Affirmative Off Case Answers SLUDL/NAUDL 2015-16 Answer to: would have solved 9/11- extensions (___) (__) Can’t connect all the dots, 9/11 proves. Hirsh, national editor for Politico Magazine, 2013 (Michael,"The Surveillance State: How We Got Here and What Congress Knew," nationaljournal, http://www.nationaljournal.com/nationalsecurity/the-surveillance-state-how-we-got-here-and-what-congressknew-20130607) The challenge is that even now, in spite of these programs, the intelligence community remains overwhelmed by data, and as the Boston Marathon bombings in April showed, it is very difficult to piece together clues in time to stop an attack. "There are massive gaps in our ability to actually analyze data. Much of the data just sits there and nobody looks at it," says one former NSA official who would discuss classified programs only on condition of anonymity. "People can do pretty horrific things on their own. Whether with explosive devices, or chemicals or biological agents. Everybody's walking around with these devastating weapons. How are you going to stop that?" Intelligence professionals say that it is only with mass data collection that they can find the key "intersections" of data that allow them to piece together the right clues. For example, if an individual orders a passport and supplies an address where some suspicious people are known to be, that might raise some concerns – without, however, leading to a definite clue to a plot. Yet if the same person who ordered the passport also buys a lot of fertilizer at another address, then only the intersection of those two data points will make the clues add up to a threat that authorities can act on. In a Jan. 30, 2006 op-ed in The New York Times headlined "Why We Listen," former NSA senior director Philip Bobbitt provided a vivid example of how this "threat matrix" works. On Sept. 10, 2001, he wrote, the NSA intercepted two messages: ''The match begins tomorrow'' and ''Tomorrow is zero hour.'' They were picked up from random monitoring of pay phones in areas of Afghanistan where Al Qaeda was active. No one in the intel community knew what to make of them, and in any case they were not translated or disseminated until Sept. 12. But, Bobbitt wrote, "had we at the time cross-referenced credit card accounts, frequent-flyer programs and a cellphone number shared by those two men, data mining might easily have picked up on the 17 other men linked to them and flying on the same day at the same time on four flights." 89/92 NSA Affirmative Off Case Answers SLUDL/NAUDL 2015-16 Answer to the Executive Counterplan (JV & V Only) 1. The executive can’t limit its own power. Only the affirmative solves. Donohue, 2008 Laura Donohue is Professor of Law, Georgetown University Law Center, The cost of counterterrorism: power, politics, and liberty. Cambridge University Press. These are just examples of checks that could be instituted within the executive — an immensely complex problem that deserves further scrutiny. Yet I am skeptical about the ability of the executive, as an organ, to limit its quest for more power. After all, because it falls directly to this branch to take responsibility for crime and threats to national security, it is to be expected that it would seek the broadest range of powers available. The judiciary also has an important role to play in setting the limits of state authority. It was Brandenburg v. Ohio that established protections for political speech in the United States (see Chapter whereas Hamdan v. Rumsfeld restricted executive expansion in the context of habeas claims (see Chapter 2). 10 On the other side of the Atlantic, A and others v. Secretary of State for the Home Department led to the repeal of indefinite detention (see Chapter 2).11 The courts' role, though, ought not to be overemphasized, as their ability to check the executive is, as I have shown, limited. And most of the remedies available to the courts are inadequate for stemming expansions in counterterrorist law. In other words, we should care about what the judiciary does and says, but not assume that it is the most important player, or even the final word, in respect to counterterrorism. Instead, I see the legislature as the crucial player. This body acts as an enabler, providing the executive with legal legitimacy. It is the most representative of the people. It can lead and respond to them. And it has the authority to hold the government to account for the immediate and ongoing need for extraordinary provisions. The legislature can demand that the executive show that the powers are being used appropriately and demonstrate the efforts being made to mitigate the broader costs. Insisting that the government makes its case, releasing into the public domain whatever it can of relevant information, reverses the usual course of counterterrorism- where the executive is able to put through many of its demands immediately following a terrorist attack, leaving to those who find the provisions excessive and want to repeal them the impossible task of proving either that no violence will follow repeal or that some violence is acceptable. The legislature has the power to reverse the counterterrorist spiral. 2. Obama doesn’t think that he can unilaterally end bulk collection. Levine, 2015 Sam Levine 15, 5-26-2015, "Rand Paul: Obama Started NSA Bulk Collection And Can End It By Himself," Huffington Post, http://www.huffingtonpost.com/2015/05/26/rand-paul-nsa_n_7442448.html Speaking generally about Paul's comments, White House press secretary Josh Earnest said Tuesday that Obama could not unilaterally end bulk data collection. "The authorities that are used by our national security professionals to keep us safe are authorities that are given to those national security professionals by the Congress, and those authorities can only be renewed by the United States Congress through an act of Congress," Earnest said. 90/92 NSA Affirmative Off Case Answers SLUDL/NAUDL 2015-16 Answers to Politics – Plan is popular (V Only) (__) (__) Snowden turned the tide, surveillance is unpopular. The Hill 15, 6-3-2015, "Spy critics eye next targets," http://thehill.com/policy/national-security/243983-spycritics-eye-next-targets Perhaps no single event helped propel reform more than the leaks from Snowden, which exposed the sweeping nature of the NSA’s previously secret warrantless collection of data about millions of phone calls made in the U.S. But the action was also spurred by a new political climate, especially the increasing influence of the libertarian wing of the Republican Party. No one felt that new political reality more than Senate Majority Leader Mitch McConnell (R-Ky.), who appeared dumbfounded at his repeated inability to push through an unchanged reauthorization of the Patriot Act laws, even with Republicans in command of both chambers of Congress. One of the biggest obstacles in McConnell’s path was Sen. Rand Paul (R-Ky.), who has made his opposition to federal surveillance one of the pillars of his campaign for the White House. Paul refused to vote for the USA Freedom Act, arguing the reforms didn’t go far enough, and he held up the legislation long enough to force a temporary lapse in the surveillance powers. (__) The plan is popular Politico 15, "Prospects dim for 11th-hour PATRIOT Act deal," POLITICO, 5-26-2015, http://www.politico.com/story/2015/05/prospects-dim-for-11th-hour-patriot-act-deal-118300.html?hp=t3_r The PATRIOT Act used to have overwhelming support in Congress — reauthorization passed in 2010 by a voice vote. But minimal dissent gradually turned into a firestorm of opposition after contractor Edward Snowden exposed the breadth of the bulk data collection program in 2013. For the first time, a clean extension of the bill couldn’t garner a majority on the Senate floor on Saturday and attracted just two Democratic supporters, an unprecedented level of opposition. 91/92 NSA Affirmative Off Case Answers SLUDL/NAUDL 2015-16 Answers to Politics – Plan is popular with public (V Only) (___) (__) Voters hate surveillance. Ackerman, National Security editor for the The Guardian, 2015, (Spencer, "NSA surveillance opposed by American voters from all parties, poll finds," Guardian, http://www.theguardian.com/us-news/2015/may/18/us-voters-broadly-opposed-nsa-surveillance (Spencer, 6-1-2015, "Fears NSA will seek to undermine surveillance reform," Guardian, http://www.theguardian.com/us-news/2015/jun/01/nsa-surveillance-patriot-act-congress-secret-law) More than three-quarters of likely voters the poll interviewed opposed related aspects of current surveillance authorities and operations. Eighty-two percent are “concerned” about government collection and retention of their personal data. Eighty-three percent are concerned about government access to data stored by businesses without judicial orders, and 84% want the same judicial protections on their virtual data as exist for physical records on their property. The same percentage is concerned about government use of that data for non-counter-terrorism purposes. “Consensus on this issue is bipartisan,” said Strimple. “There’s real concern about what the government’s accessing about your personal life.” (__) Voters support NSA reform. Ackerman, National Security Editor at the Gaurdain,2015 (Spencer, "NSA surveillance opposed by American voters from all parties, poll finds," Guardian, http://www.theguardian.com/us-news/2015/may/18/us-voters-broadly-opposed-nsa-surveillance Neema Singh Giuliani of the ACLU said the poll results show a “disconnection” between anti-surveillance fervor by voters and a congressional debate bounded by retained surveillance powers at one pole and what she described as the “modest reform” of the USA Freedom Act on the other. “The fact that a lot of members of Congress are still pushing forward to try to reauthorize provisions of the law that many people find concerning is not reflective of the view of the vast majority of the public of both parties,” she said. 92/92